CVE-2019-19332
Kernel: kvm: OOB memory write via kvm_dev_ioctl_get_cpuid
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
Se encontró un problema de escritura de memoria fuera de límites en el kernel de Linux, versiones 3.13 hasta 5.4, en la manera en que el hipervisor KVM del kernel de Linux manejó la petición "KVM_GET_EMULATED_CPUID" ioctl(2) para obtener las funcionalidades de CPUID emuladas por el hipervisor KVM. Un usuario o proceso capaz de acceder al dispositivo "/dev/kvm" podría usar este fallo para bloquear el sistema, resultando en una denegación de servicio.
An out-of-bounds memory write issue was found in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-11-27 CVE Reserved
- 2020-01-09 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html | Mailing List | |
https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50%40google.com | X_refsource_misc | |
https://security.netapp.com/advisory/ntap-20200204-0002 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332 | 2024-08-05 | |
https://www.openwall.com/lists/oss-security/2019/12/16/1 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | 2023-02-12 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html | 2023-02-12 | |
https://usn.ubuntu.com/4254-1 | 2023-02-12 | |
https://usn.ubuntu.com/4254-2 | 2023-02-12 | |
https://usn.ubuntu.com/4258-1 | 2023-02-12 | |
https://usn.ubuntu.com/4284-1 | 2023-02-12 | |
https://usn.ubuntu.com/4287-1 | 2023-02-12 | |
https://usn.ubuntu.com/4287-2 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2019-19332 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1779594 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13 <= 5.4 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 <= 5.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
|