7.8
CVSSv3

CVE-2019-7221

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The KVM implementation in the Linux kernel up to and including 4.20.5 has a Use-after-Free.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

opensuse leap 15.0

fedoraproject fedora 28

fedoraproject fedora 29

debian debian linux 8.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

netapp element software management node -

netapp active iq performance analytics services -

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat openshift container platform 3.11

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 74 Advanced Update Support, Red Hat Enterprise Linux 74 Telco Extended Update Support, and Red Hat Enterprise Linux 74 Update Services ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor emulates a preemption timer for L2 guests when nested (=1) virtualization is enabled This high resolution timer(hrtimer) runs when a L2 guest is active After VM exit, the sync_vmcs12() timer object is stopped The use-after-free occurs if the timer object is fre ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table If such file descriptor was to be closed, reference co ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Impact: Important Public Date: 2019-02-07 CWE: CWE-416 Bugzilla: 1671904: CVE-2019-7221 Kernel: KVM: nV ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor emulates a preemption timer for L2 guests when nested (=1) virtualization is enabled This high resolution timer(hrtimer) runs when a L2 guest is active After VM exit, the sync_vmcs12() timer object is stopped The use-after-free occurs if the timer object is fre ...

References

CWE-416https://github.com/torvalds/linux/commits/master/arch/x86/kvmhttps://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlhttps://usn.ubuntu.com/3932-2/https://usn.ubuntu.com/3932-1/https://usn.ubuntu.com/3931-2/https://usn.ubuntu.com/3931-1/https://usn.ubuntu.com/3930-2/https://usn.ubuntu.com/3930-1/https://security.netapp.com/advisory/ntap-20190404-0002/https://access.redhat.com/errata/RHSA-2019:0833https://access.redhat.com/errata/RHSA-2019:0818https://lists.debian.org/debian-lts-announce/2019/05/msg00002.htmlhttps://access.redhat.com/errata/RHBA-2019:0959https://access.redhat.com/errata/RHSA-2019:3967https://access.redhat.com/errata/RHSA-2019:4058https://support.f5.com/csp/article/K08413011https://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.htmlhttp://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.htmlhttp://www.openwall.com/lists/oss-security/2019/02/18/2https://bugs.chromium.org/p/project-zero/issues/detail?id=1760https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65fhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2019:0818https://usn.ubuntu.com/3930-1/https://alas.aws.amazon.com/ALAS-2019-1165.html