CVE-2019-14821 (CNNVD-201909-887)

HIGH
中文标题:
Linux kernel 缓冲区错误漏洞
英文标题:
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Li...
CVSS分数: 7.5
发布时间: 2019-09-19 17:37:24
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 5.3及之前版本中的KVM虚拟机监视器的实现存在缓冲区错误漏洞。攻击者可利用该漏洞造成主机内核崩溃,导致拒绝服务或可能提升权限。

英文描述:

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CWE类型:
CWE-787
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Linux Kernel all through 5.3 - - cpe:2.3:a:linux:kernel:all_through_5.3:*:*:*:*:*:*:*
linux linux_kernel * - - cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linux linux_kernel 5.4 - - cpe:2.3:o:linux:linux_kernel:5.4:rc1:*:*:*:*:*:*
redhat virtualization_host 4.0 - - cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
redhat enterprise_linux 8.0 - - cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 6.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 7.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_eus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_for_real_time 7 - - cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*
redhat enterprise_linux_for_real_time 8 - - cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*
redhat enterprise_linux_server 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.7 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 6.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
canonical ubuntu_linux 14.04 - - cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
canonical ubuntu_linux 18.04 - - cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
canonical ubuntu_linux 19.04 - - cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
opensuse leap 15.0 - - cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
opensuse leap 15.1 - - cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
fedoraproject fedora 29 - - cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
fedoraproject fedora 30 - - cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
netapp aff_a700s_firmware - - - cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
netapp h300s_firmware - - - cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
netapp h500s_firmware - - - cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
netapp h700s_firmware - - - cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
netapp h300e_firmware - - - cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
netapp h500e_firmware - - - cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
netapp h700e_firmware - - - cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
netapp h410s_firmware - - - cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
netapp h410c_firmware - - - cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
netapp h610s_firmware - - - cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
netapp data_availability_services - - - cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*
netapp hci_management_node - - - cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*
netapp solidfire - - - cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
oracle sd-wan_edge 7.3 - - cpe:2.3:a:oracle:sd-wan_edge:7.3:*:*:*:*:*:*:*
oracle sd-wan_edge 8.0 - - cpe:2.3:a:oracle:sd-wan_edge:8.0:*:*:*:*:*:*:*
oracle sd-wan_edge 8.1 - - cpe:2.3:a:oracle:sd-wan_edge:8.1:*:*:*:*:*:*:*
oracle sd-wan_edge 8.2 - - cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer mailing-list
cve.org
访问
FEDORA-2019-15e141c6a7 vendor-advisory
cve.org
访问
[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update mailing-list
cve.org
访问
20190925 [SECURITY] [DSA 4531-1] linux security update mailing-list
cve.org
访问
DSA-4531 vendor-advisory
cve.org
访问
[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update mailing-list
cve.org
访问
FEDORA-2019-a570a92d5a vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
openSUSE-SU-2019:2307 vendor-advisory
cve.org
访问
openSUSE-SU-2019:2308 vendor-advisory
cve.org
访问
USN-4157-1 vendor-advisory
cve.org
访问
USN-4162-1 vendor-advisory
cve.org
访问
USN-4157-2 vendor-advisory
cve.org
访问
USN-4163-1 vendor-advisory
cve.org
访问
USN-4163-2 vendor-advisory
cve.org
访问
USN-4162-2 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2019:3309 vendor-advisory
cve.org
访问
RHSA-2019:3517 vendor-advisory
cve.org
访问
20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01) mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2019:3978 vendor-advisory
cve.org
访问
RHSA-2019:3979 vendor-advisory
cve.org
访问
RHSA-2019:4154 vendor-advisory
cve.org
访问
RHSA-2019:4256 vendor-advisory
cve.org
访问
RHSA-2020:0027 vendor-advisory
cve.org
访问
RHSA-2020:0204 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
3.0 (cna)
HIGH
7.5
CVSS向量: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
机密性
NONE
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2019-09-19 17:37:24
修改时间:
2024-08-05 00:26:39
创建时间:
2025-11-11 15:35:34
更新时间:
2025-11-11 15:54:58
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2019-14821 2025-11-11 15:20:02 2025-11-11 07:35:34
NVD nvd_CVE-2019-14821 2025-11-11 14:56:26 2025-11-11 07:44:06
CNNVD cnnvd_CNNVD-201909-887 2025-11-11 15:10:17 2025-11-11 07:54:58
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:54:58
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-201909-887; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-201909-887
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:06
affected_products_count: 1 → 44; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 1 -> 44
  • data_sources: ['cve'] -> ['cve', 'nvd']