Oval Definition:oval:com.ubuntu.xenial:def:2019148350000000
Revision Date:2019-09-17Version:1
Title:CVE-2019-14835 on Ubuntu 16.04 LTS (xenial) - high.
Description:A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. Peter Pi discovered a buffer overflow in the virtio network backend (vhost_net) implementation in the Linux kernel. An attacker in a guest may be able to use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2019-14835
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • linux package in xenial was vulnerable but has been fixed (note: '4.4.0-164.192').
  • OR linux-aws package in xenial was vulnerable but has been fixed (note: '4.4.0-1094.105').
  • OR linux-aws-hwe package in xenial was vulnerable but has been fixed (note: '4.15.0-1050.52~16.04.1').
  • OR linux-azure package in xenial was vulnerable but has been fixed (note: '4.15.0-1059.64').
  • OR linux-gcp package in xenial was vulnerable but has been fixed (note: '4.15.0-1044.46').
  • OR linux-hwe package in xenial was vulnerable but has been fixed (note: '4.15.0-64.73~16.04.1').
  • OR linux-kvm package in xenial was vulnerable but has been fixed (note: '4.4.0-1058.65').
  • OR linux-meta package in xenial was vulnerable but has been fixed (note: '4.4.0-164.192').
  • OR linux-meta-aws package in xenial was vulnerable but has been fixed (note: '4.4.0-1094.105').
  • OR linux-meta-aws-hwe package in xenial was vulnerable but has been fixed (note: '4.15.0-1050.52~16.04.1').
  • OR linux-meta-azure package in xenial was vulnerable but has been fixed (note: '4.15.0-1059.64').
  • OR linux-meta-gcp package in xenial was vulnerable but has been fixed (note: '4.15.0-1044.46').
  • OR linux-meta-hwe package in xenial was vulnerable but has been fixed (note: '4.15.0-64.73~16.04.1').
  • OR linux-meta-kvm package in xenial was vulnerable but has been fixed (note: '4.4.0-1058.65').
  • OR linux-meta-oracle package in xenial was vulnerable but has been fixed (note: '4.15.0-1025.28~16.04.1').
  • OR linux-meta-raspi2 package in xenial was vulnerable but has been fixed (note: '4.4.0-1122.131').
  • OR linux-meta-snapdragon package in xenial was vulnerable but has been fixed (note: '4.4.0-1126.132').
  • OR linux-oem: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'was needs-triage now end-of-life').
  • OR linux-oracle package in xenial was vulnerable but has been fixed (note: '4.15.0-1025.28~16.04.1').
  • OR linux-raspi2 package in xenial was vulnerable but has been fixed (note: '4.4.0-1122.131').
  • OR linux-signed package in xenial was vulnerable but has been fixed (note: '4.4.0-164.192').
  • OR linux-signed-azure package in xenial was vulnerable but has been fixed (note: '4.15.0-1059.64').
  • OR linux-signed-gcp package in xenial was vulnerable but has been fixed (note: '4.15.0-1044.46').
  • OR linux-signed-hwe package in xenial was vulnerable but has been fixed (note: '4.15.0-64.73~16.04.1').
  • OR linux-signed-oracle package in xenial was vulnerable but has been fixed (note: '4.15.0-1025.28~16.04.1').
  • OR linux-snapdragon package in xenial was vulnerable but has been fixed (note: '4.4.0-1126.132').
  • BACK