Description
A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13497 | A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue. |
Ubuntu USN |
USN-3979-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3980-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3980-2 | Linux kernel (HWE) vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Real Time
Subscribe
Enterprise Linux For Real Time For Nfv
Subscribe
Enterprise Linux For Real Time For Nfv Tus
Subscribe
Enterprise Linux For Real Time Tus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.713Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3887
No data.
Status : Modified
Published: 2019-04-09T16:29:01.990
Modified: 2024-11-21T04:42:48.077
Link: CVE-2019-3887
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN