Description
An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2068-1 | linux security update |
Debian DLA |
DLA-2114-1 | linux-4.9 security update |
EUVD |
EUVD-2019-8953 | An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service. |
Ubuntu USN |
USN-4254-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4254-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-4258-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4284-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4287-2 | Linux kernel (Azure) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T02:16:47.112Z
Reserved: 2019-11-27T00:00:00.000Z
Link: CVE-2019-19332
No data.
Status : Modified
Published: 2020-01-09T15:15:10.623
Modified: 2024-11-21T04:34:35.547
Link: CVE-2019-19332
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN