Korean
<< Back
VID 14260
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2019:2829 which is kernel security update.
The system which does not apply the update is affected by a buffer overflow flaw was found in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

Note: This check solely relied on the kernel RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://access.redhat.com/security/vulnerabilities/kernel-vhost
https://access.redhat.com/errata/RHSA-2019:2829
https://access.redhat.com/security/cve/cve-2019-14835

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 7)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update
Related URL CVE-2019-14835 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)