6.8
CVSSv2

CVE-2019-6974

Published: 15/02/2019 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the Linux kernel prior to 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 8.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

f5 big-ip local traffic manager

f5 big-ip application acceleration manager

f5 big-ip advanced firewall manager

f5 big-ip analytics

f5 big-ip access policy manager

f5 big-ip application security manager

f5 big-ip edge gateway

f5 big-ip fraud protection service

f5 big-ip global traffic manager

f5 big-ip link controller

f5 big-ip policy enforcement manager

f5 big-ip webaccelerator

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.4

redhat enterprise linux server tus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat openshift container platform 3.11

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 74 Advanced Update Support, Red Hat Enterprise Linux 74 Telco Extended Update Support, and Red Hat Enterprise Linux 74 Update Services ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor emulates a preemption timer for L2 guests when nested (=1) virtualization is enabled This high resolution timer(hrtimer) runs when a L2 guest is active After VM exit, the sync_vmcs12() timer object is stopped The use-after-free occurs if the timer object is fre ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table If such file descriptor was to be closed, reference co ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table If such file descriptor was to be closed, reference co ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table If such file descriptor was to be closed, reference co ...

Exploits

kvm_ioctl_create_device() contains the following code: dev = kzalloc(sizeof(*dev), GFP_KERNEL); if (!dev) return -ENOMEM; dev->ops = ops; dev->kvm = kvm; mutex_lock(&kvm->lock); ret = ops->create(dev, cd->type); if (ret < 0) { mutex_unlo ...

References

CWE-362CWE-416https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99https://bugs.chromium.org/p/project-zero/issues/detail?id=1765http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9https://www.exploit-db.com/exploits/46388/http://www.securityfocus.com/bid/107127https://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlhttps://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlhttps://usn.ubuntu.com/3933-2/https://usn.ubuntu.com/3932-2/https://usn.ubuntu.com/3932-1/https://usn.ubuntu.com/3931-2/https://usn.ubuntu.com/3931-1/https://usn.ubuntu.com/3930-2/https://usn.ubuntu.com/3930-1/https://usn.ubuntu.com/3933-1/https://support.f5.com/csp/article/K11186236https://access.redhat.com/errata/RHSA-2019:0833https://access.redhat.com/errata/RHSA-2019:0818https://lists.debian.org/debian-lts-announce/2019/05/msg00002.htmlhttps://access.redhat.com/errata/RHBA-2019:0959https://access.redhat.com/errata/RHSA-2019:2809https://access.redhat.com/errata/RHSA-2019:3967https://access.redhat.com/errata/RHSA-2020:0103https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSShttps://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2019:0818https://www.exploit-db.com/exploits/46388https://usn.ubuntu.com/3930-1/https://alas.aws.amazon.com/ALAS-2019-1165.html