An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2068-1 | linux security update |
Debian DLA |
DLA-2114-1 | linux-4.9 security update |
EUVD |
EUVD-2019-8953 | An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service. |
Ubuntu USN |
USN-4254-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4254-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-4258-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4284-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-2 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T02:16:47.112Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2019-19332
No data.
Status : Modified
Published: 2020-01-09T15:15:10.623
Modified: 2024-11-21T04:34:35.547
Link: CVE-2019-19332
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN