Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C) (V2 legend) [1]
Description : A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
From Victor Rodriguez:
This CVE does not match the StarlingX policy since the Attack Vector (AV)* = Local instead of Network. However I might recommend to apply the patch since it is already in upstream [3] and fix approved by RHEL[2]
[1] https://nvd.nist.gov/vuln/detail/CVE-2019-14835
[2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
[3] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=060423bfdee3f8bc6e2c1bac97de24d5415e2bc4
This doesn't meet the fix criteria for starlingX. Need to discuss in the security meeting if there is something special for this CVE that would make us deal with it as an exception.