CVE-2019-14835

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html Third Party Advisory VDB Entry
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/09/24/1 Mailing List
http://www.openwall.com/lists/oss-security/2019/10/03/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/10/09/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/10/09/7 Mailing List Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:2824 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2827 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2828 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2829 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2830 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2862 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2863 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2864 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2865 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2866 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2867 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2869 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2889 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2899 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2900 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2901 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2924 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/ Mailing List
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ Mailing List
https://seclists.org/bugtraq/2019/Nov/11 Issue Tracking Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/41 Issue Tracking Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20191031-0005/ Third Party Advisory
https://usn.ubuntu.com/4135-1/ Third Party Advisory
https://usn.ubuntu.com/4135-2/ Third Party Advisory
https://www.debian.org/security/2019/dsa-4531 Third Party Advisory
https://www.openwall.com/lists/oss-security/2019/09/17/1 Exploit Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:aff_a700s:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:*:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:*:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:*:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:*:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:*:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:*:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:*:*:*:*:*:*:*:*

Configuration 16 (hide)

OR cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

Configuration 17 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
OR cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 19 (hide)

OR cpe:2.3:a:huawei:imanager_neteco:v600r009c00:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco:v600r009c10spc200:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c10spc300:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c20:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.0.spc100.b210:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.1rc1.b060:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.1rc1.b080:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.rc2.b050:*:*:*:*:*:*:*

History

15 Dec 2023, 15:29

Type Values Removed Values Added
CPE cpe:2.3:a:netapp:_steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/', 'name': 'FEDORA-2019-e3010166bd', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/', 'name': 'FEDORA-2019-a570a92d5a', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ - Mailing List
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/ - Mailing List

02 Jun 2021, 15:44

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:h:netapp:aff_a700s:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco:v600r009c10spc200:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c20:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.rc2.b050:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco:v600r009c00:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.1rc1.b060:*:*:*:*:*:*:*
cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c10spc300:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.1rc1.b080:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:a:huawei:manageone:6.5.0.spc100.b210:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:a:netapp:_steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2865 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2865 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2901 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2901 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2862 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2862 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/10/09/3 - (MLIST) http://www.openwall.com/lists/oss-security/2019/10/09/3 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html - (MISC) http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html - Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2019/10/09/7 - (MLIST) http://www.openwall.com/lists/oss-security/2019/10/09/7 - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2019/dsa-4531 - (DEBIAN) https://www.debian.org/security/2019/dsa-4531 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2900 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2900 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2830 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2830 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2827 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2827 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2924 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2924 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/09/24/1 - (MLIST) http://www.openwall.com/lists/oss-security/2019/09/24/1 - Mailing List
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/11 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Nov/11 - Issue Tracking, Mailing List, Third Party Advisory
References (UBUNTU) https://usn.ubuntu.com/4135-1/ - (UBUNTU) https://usn.ubuntu.com/4135-1/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2867 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2867 - Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Sep/41 - (BUGTRAQ) https://seclists.org/bugtraq/2019/Sep/41 - Issue Tracking, Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2866 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2866 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2899 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2899 - Third Party Advisory
References (CONFIRM) http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en - (CONFIRM) http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2889 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2889 - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - (MISC) http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html - Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2829 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2829 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2863 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2863 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2854 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2854 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHBA-2019:2824 - (REDHAT) https://access.redhat.com/errata/RHBA-2019:2824 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2869 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2869 - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html - (MLIST) https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html - Mailing List, Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2828 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2828 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2019:2864 - (REDHAT) https://access.redhat.com/errata/RHSA-2019:2864 - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - (MISC) http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html - Third Party Advisory, VDB Entry
References (CONFIRM) https://security.netapp.com/advisory/ntap-20191031-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20191031-0005/ - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2019/10/03/1 - (MLIST) http://www.openwall.com/lists/oss-security/2019/10/03/1 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/ - Third Party Advisory

Information

Published : 2019-09-17 16:15

Updated : 2024-02-04 20:20


NVD link : CVE-2019-14835

Mitre link : CVE-2019-14835

CVE.ORG link : CVE-2019-14835


JSON object : View

Products Affected

netapp

  • h610s
  • h610s_firmware
  • h500s
  • solidfire
  • steelstore_cloud_integrated_storage
  • h300s
  • h410c_firmware
  • h300s_firmware
  • h700e_firmware
  • h700e
  • h700s_firmware
  • h300e
  • h410s_firmware
  • aff_a700s
  • h500e_firmware
  • h500e
  • h700s
  • h410s
  • service_processor
  • aff_a700s_firmware
  • h410c
  • data_availability_services
  • h300e_firmware
  • hci_management_node
  • h500s_firmware

redhat

  • enterprise_linux_for_real_time
  • enterprise_linux_server
  • enterprise_linux
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • virtualization
  • enterprise_linux_server_tus
  • openshift_container_platform
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • virtualization_host

debian

  • debian_linux

huawei

  • manageone
  • imanager_neteco
  • imanager_neteco_6000

canonical

  • ubuntu_linux

linux

  • linux_kernel

fedoraproject

  • fedora

opensuse

  • leap
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')