{"id":"CVE-2019-14821","details":"An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring-\u003efirst' and 'ring-\u003elast' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.","modified":"2026-03-15T22:29:33.211174Z","published":"2019-09-19T18:15:10.700Z","related":["MGASA-2019-0287","MGASA-2019-0288","MGASA-2019-0333","SUSE-SU-2019:14218-1","SUSE-SU-2019:2648-1","SUSE-SU-2019:2651-1","SUSE-SU-2019:2658-1","SUSE-SU-2019:2706-1","SUSE-SU-2019:2710-1","SUSE-SU-2019:2756-1","SUSE-SU-2019:2879-1","SUSE-SU-2019:2949-1","SUSE-SU-2019:2950-1","SUSE-SU-2019:2984-1","SUSE-SU-2019:3200-1","SUSE-SU-2019:3295-1","SUSE-SU-2020:0093-1","openSUSE-SU-2019:2307-1","openSUSE-SU-2019:2308-1"],"references":[{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3517"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20191004-0001/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3978"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Nov/11"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4162-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4163-1/"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4157-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4531"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3309"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4157-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4162-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3979"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4163-2/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4154"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:4256"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0027"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"type":"REPORT","url":"https://seclists.org/bugtraq/2019/Sep/41"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2019/09/20/1"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.6.27"},{"last_affected":"3.15.10"}]},{"events":[{"introduced":"3.16"},{"fixed":"3.16.74"}]},{"events":[{"introduced":"4.4"},{"fixed":"4.4.194"}]},{"events":[{"introduced":"4.9"},{"fixed":"4.9.194"}]},{"events":[{"introduced":"4.14"},{"fixed":"4.14.146"}]},{"events":[{"introduced":"4.19"},{"fixed":"4.19.75"}]},{"events":[{"introduced":"5.2"},{"fixed":"5.2.17"}]},{"events":[{"introduced":"5.3"},{"fixed":"5.3.1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.4-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7"}]},{"events":[{"introduced":"0"},{"last_affected":"8"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14821.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}