First published: Thu Aug 29 2019(Updated: )
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.25.1.el6 | 0:2.6.32-754.25.1.el6 |
redhat/kernel-rt | <0:3.10.0-1062.7.1.rt56.1030.el7 | 0:3.10.0-1062.7.1.rt56.1030.el7 |
redhat/kernel | <0:3.10.0-1062.7.1.el7 | 0:3.10.0-1062.7.1.el7 |
redhat/kernel-alt | <0:4.14.0-115.16.1.el7a | 0:4.14.0-115.16.1.el7a |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel | <0:4.18.0-80.15.1.el8_0 | 0:4.18.0-80.15.1.el8_0 |
Linux Linux kernel | >=2.6.27<=3.15.10 | |
Linux Linux kernel | >=3.16<3.16.74 | |
Linux Linux kernel | >=4.4<4.4.194 | |
Linux Linux kernel | >=4.9<4.9.194 | |
Linux Linux kernel | >=4.14<4.14.146 | |
Linux Linux kernel | >=4.19<4.19.75 | |
Linux Linux kernel | >=5.2<5.2.17 | |
Linux Linux kernel | >=5.3<5.3.1 | |
Linux Linux kernel | =5.4-rc1 | |
Redhat Virtualization Host | =4.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Eus | =7.7 | |
Redhat Enterprise Linux For Real Time | =7 | |
Redhat Enterprise Linux For Real Time | =8 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.7 | |
Redhat Enterprise Linux Server Tus | =7.7 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
All of | ||
Netapp Aff A700s Firmware | ||
NetApp AFF A700s | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H300e Firmware | ||
Netapp H300e | ||
All of | ||
Netapp H500e Firmware | ||
Netapp H500e | ||
All of | ||
Netapp H700e Firmware | ||
Netapp H700e | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
All of | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
Netapp Data Availability Services | ||
Netapp Hci Management Node | ||
Netapp Solidfire | ||
Oracle SD-WAN Edge | =7.3 | |
Oracle SD-WAN Edge | =8.0 | |
Oracle SD-WAN Edge | =8.1 | |
Oracle SD-WAN Edge | =8.2 | |
Netapp Aff A700s Firmware | ||
NetApp AFF A700s | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H300e Firmware | ||
Netapp H300e | ||
Netapp H500e Firmware | ||
Netapp H500e | ||
Netapp H700e Firmware | ||
Netapp H700e | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
Netapp H410c Firmware | ||
Netapp H410c | ||
Netapp H610s Firmware | ||
Netapp H610s | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Restrict access to the '/dev/kvm' device to trusted users.
Ensure that untrusted users cannot write to the /dev/kvm device
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)