First published: Sat Sep 21 2019(Updated: )
This is a kernel live patch module which can be loaded by the kpatch command line utility to modify the code of a running kernel.<br>Security Fix(es):<br><li> A buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. (CVE-2019-14835)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kpatch-patch | <3_10_0-1062-1-1.el7 | 3_10_0-1062-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062_1_1-1-1.el7 | 3_10_0-1062_1_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062-1-1.el7 | 3_10_0-1062-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062-debuginfo-1-1.el7 | 3_10_0-1062-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062_1_1-1-1.el7 | 3_10_0-1062_1_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062_1_1-debuginfo-1-1.el7 | 3_10_0-1062_1_1-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062-1-1.el7 | 3_10_0-1062-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062-debuginfo-1-1.el7 | 3_10_0-1062-debuginfo-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062_1_1-1-1.el7 | 3_10_0-1062_1_1-1-1.el7 |
redhat/kpatch-patch | <3_10_0-1062_1_1-debuginfo-1-1.el7 | 3_10_0-1062_1_1-debuginfo-1-1.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.