2.1
CVSSv2

CVE-2019-7222

Published: 21/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The KVM implementation in the Linux kernel up to and including 4.20.5 has an Information Leak.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 28

fedoraproject fedora 29

opensuse leap 15.0

debian debian linux 8.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

netapp element software management node -

netapp active iq performance analytics services -

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux for real time 7

redhat enterprise linux for real time for nfv 7

redhat enterprise linux 8.0

redhat enterprise linux eus 8.1

redhat enterprise linux eus 8.2

redhat enterprise linux server tus 8.2

redhat enterprise linux server aus 8.2

redhat enterprise linux for real time 8

redhat enterprise linux server tus 8.4

redhat enterprise linux eus 8.4

redhat enterprise linux for real time for nfv tus 8.4

redhat enterprise linux for real time for nfv tus 8.2

redhat enterprise linux for real time tus 8.4

redhat enterprise linux for real time tus 8.2

redhat enterprise linux server aus 8.4

redhat enterprise linux server aus 8.6

redhat enterprise linux server tus 8.6

redhat enterprise linux eus 8.6

redhat enterprise linux for real time for nfv tus 8.6

redhat enterprise linux for real time tus 8.6

Vendor Advisories

Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor emulates a preemption timer for L2 guests when nested (=1) virtualization is enabled This high resolution timer(hrtimer) runs when a L2 guest is active After VM exit, the sync_vmcs12() timer object is stopped The use-after-free occurs if the timer object is fre ...
A use-after-free vulnerability was found in the way the Linux kernel's KVM hypervisor implements its device control API While creating a device via kvm_ioctl_create_device(), the device holds a reference to a VM object, later this reference is transferred to the caller's file descriptor table If such file descriptor was to be closed, reference co ...
Impact: Low Public Date: 2019-02-07 CWE: CWE-200 Bugzilla: 1671930: CVE-2019-7222 Kernel: KVM: leak of ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
An information leakage issue was found in the way Linux kernel's KVM hypervisor handled page fault exceptions while emulating instructions like VMXON, VMCLEAR, VMPTRLD, and VMWRITE with memory address as an operand It occurs if the operand is a mmio address, as the returned exception object holds uninitialized stack memory contents A guest user/p ...

References

NVD-CWE-noinfohttps://github.com/torvalds/linux/commits/master/arch/x86/kvmhttps://bugs.chromium.org/p/project-zero/issues/detail?id=1759http://www.securityfocus.com/bid/106963http://www.openwall.com/lists/oss-security/2019/02/18/2http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-02/msg00042.htmlhttps://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlhttps://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlhttps://usn.ubuntu.com/3933-2/https://usn.ubuntu.com/3932-2/https://usn.ubuntu.com/3932-1/https://usn.ubuntu.com/3931-2/https://usn.ubuntu.com/3931-1/https://usn.ubuntu.com/3930-2/https://usn.ubuntu.com/3930-1/https://security.netapp.com/advisory/ntap-20190404-0002/https://usn.ubuntu.com/3933-1/https://lists.debian.org/debian-lts-announce/2019/05/msg00002.htmlhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412ahttps://access.redhat.com/errata/RHSA-2019:2043https://access.redhat.com/errata/RHSA-2019:2029https://access.redhat.com/errata/RHSA-2019:3309https://access.redhat.com/errata/RHSA-2019:3517https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDOXCX3QFVWYXH5CQMGDDE7H6MUG5XGG/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y2HMABEMJDPA6LPCBE5WIEZXUKY7DLTN/https://nvd.nist.govhttps://access.redhat.com/errata/RHSA-2019:2043https://usn.ubuntu.com/3930-1/https://alas.aws.amazon.com/ALAS-2019-1165.html