First published: Thu Aug 29 2019(Updated: )
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.25.1.el6 | 0:2.6.32-754.25.1.el6 |
redhat/kernel-rt | <0:3.10.0-1062.7.1.rt56.1030.el7 | 0:3.10.0-1062.7.1.rt56.1030.el7 |
redhat/kernel | <0:3.10.0-1062.7.1.el7 | 0:3.10.0-1062.7.1.el7 |
redhat/kernel-alt | <0:4.14.0-115.16.1.el7a | 0:4.14.0-115.16.1.el7a |
redhat/kernel | <0:3.10.0-957.56.1.el7 | 0:3.10.0-957.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
redhat/kernel | <0:4.18.0-80.15.1.el8_0 | 0:4.18.0-80.15.1.el8_0 |
Linux Kernel | >=2.6.27<=3.15.10 | |
Linux Kernel | >=3.16<3.16.74 | |
Linux Kernel | >=4.4<4.4.194 | |
Linux Kernel | >=4.9<4.9.194 | |
Linux Kernel | >=4.14<4.14.146 | |
Linux Kernel | >=4.19<4.19.75 | |
Linux Kernel | >=5.2<5.2.17 | |
Linux Kernel | >=5.3<5.3.1 | |
Linux Kernel | =5.4-rc1 | |
redhat virtualization host | =4.0 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux for real time | =7 | |
redhat enterprise Linux for real time | =8 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
All of | ||
NetApp AFF A700s Firmware | ||
NetApp AFF A700s Firmware | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
All of | ||
netapp h610s firmware | ||
netapp h610s | ||
netapp data availability services | ||
netapp hci management node | ||
netapp solidfire | ||
Oracle SD-WAN Edge | =7.3 | |
Oracle SD-WAN Edge | =8.0 | |
Oracle SD-WAN Edge | =8.1 | |
Oracle SD-WAN Edge | =8.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
Fedora | =29 | |
Fedora | =30 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
NetApp AFF A700s Firmware | ||
NetApp AFF A700s Firmware | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h610s firmware | ||
netapp h610s |
Restrict access to the '/dev/kvm' device to trusted users.
Ensure that untrusted users cannot write to the /dev/kvm device
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-14821 is rated as high severity based on its impact on the security and stability of the Linux kernel.
To fix CVE-2019-14821, you should upgrade to a patched version of the kernel that addresses this vulnerability.
CVE-2019-14821 affects all versions of the Linux kernel up to 5.3.
CVE-2019-14821 may be exploited locally, but it is not typically considered a remote attack vulnerability.
CVE-2019-14821 specifically impacts the KVM hypervisor within the Linux kernel, particularly in its handling of Coalesced MMIO write operations.