VID |
14255 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
The remote system does not apply CESA-2019:2829 which is kernel security update. The system which does not apply the update is affected by a buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
Note: This check solely relied on the kernel RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://lists.centos.org/pipermail/centos-announce/2019-October/023457.html
* Platforms Affected: CentOS Linux Server (v. 7) |
Recommendation |
Update the affected packages. Launch the graphical update tool through System -> Administration -> Software Update
For a command line interface, use the following command to update the operating system: # yum update |
Related URL |
CVE-2019-14835 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|