Buffer Overflow The advisory has been revoked - it doesn't affect any version of package kernel-obs-qa  (opens in a new tab)


Threat Intelligence

EPSS
0.46% (76th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES151-KERNELOBSQA-2739845
  • published14 Apr 2022
  • disclosed20 Sept 2019

Introduced: 20 Sep 2019

CVE-2019-14835  (opens in a new tab)
CWE-120  (opens in a new tab)

Amendment

The SLES security team deemed this advisory irrelevant for SLES:15.1.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel-obs-qa package and not the kernel-obs-qa package as distributed by SLES.

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

References