8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
28.6%
An out-of-bounds access issue was found in the Linux kernel, all versions
through 5.3, in the way Linux kernel’s KVM hypervisor implements the
Coalesced MMIO write operation. It operates on an MMIO ring buffer ‘struct
kvm_coalesced_mmio’ object, wherein write indices ‘ring->first’ and
‘ring->last’ value could be supplied by a host user-space process. An
unprivileged host user or process with access to ‘/dev/kvm’ device could
use this flaw to crash the host kernel, resulting in a denial of service or
potentially escalating privileges on the system.
Author | Note |
---|---|
tyhicks | An attacker needs write access to the /dev/kvm device file to exploit this flaw. By default, Ubuntu users don’t have privileges to write to /dev/kvm. This is true even when libvirt is installed and in use. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 19.04 | noarch | linux-azure | < 5.0.0-1023.24 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure | < 5.0.0-1023.24~18.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < 4.15.0-1061.66~14.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1061.66 | UNKNOWN |
ubuntu | 18.04 | noarch | linux | < 4.15.0-66.75 | UNKNOWN |
ubuntu | 19.04 | noarch | linux | < 5.0.0-32.34 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-166.195 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1052.54 | UNKNOWN |
ubuntu | 19.04 | noarch | linux-aws | < 5.0.0-1019.21 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1056.60) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
launchpad.net/bugs/cve/CVE-2019-14821
nvd.nist.gov/vuln/detail/CVE-2019-14821
security-tracker.debian.org/tracker/CVE-2019-14821
ubuntu.com/security/notices/USN-4157-1
ubuntu.com/security/notices/USN-4157-2
ubuntu.com/security/notices/USN-4162-1
ubuntu.com/security/notices/USN-4162-2
ubuntu.com/security/notices/USN-4163-1
ubuntu.com/security/notices/USN-4163-2
www.openwall.com/lists/oss-security/2019/09/20/1
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
28.6%