In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9 - Mailing List, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/107127 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHBA-2019:0959 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:0818 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:0833 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:2809 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:3967 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2020:0103 - Third Party Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=1765 - Exploit, Mailing List, Patch, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99 - Mailing List, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21 - Mailing List, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8 - Mailing List, Vendor Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156 - Mailing List, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9 - Exploit, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html - Mailing List, Third Party Advisory | |
References | () https://support.f5.com/csp/article/K11186236 - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSS - | |
References | () https://usn.ubuntu.com/3930-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3930-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3931-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3931-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3932-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3932-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3933-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3933-2/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46388/ - Exploit, Third Party Advisory, VDB Entry |
16 May 2023, 11:14
Type | Values Removed | Values Added |
---|---|---|
References | (BID) http://www.securityfocus.com/bid/107127 - Broken Link, Third Party Advisory, VDB Entry |
05 Apr 2022, 20:40
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8 - Mailing List, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/107127 - Broken Link | |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99 - Mailing List, Vendor Advisory | |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21 - Mailing List, Vendor Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0103 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3967 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2809 - Third Party Advisory | |
References | (MISC) https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156 - Mailing List, Vendor Advisory | |
References | (CONFIRM) https://support.f5.com/csp/article/K11186236?utm_source=f5support&utm_medium=RSS - Third Party Advisory | |
CWE | CWE-416 | |
CPE | cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* |
Information
Published : 2019-02-15 15:29
Updated : 2024-11-21 04:47
NVD link : CVE-2019-6974
Mitre link : CVE-2019-6974
CVE.ORG link : CVE-2019-6974
JSON object : View
Products Affected
f5
- big-ip_application_security_manager
- big-ip_global_traffic_manager
- big-ip_link_controller
- big-ip_edge_gateway
- big-ip_policy_enforcement_manager
- big-ip_analytics
- big-ip_application_acceleration_manager
- big-ip_fraud_protection_service
- big-ip_webaccelerator
- big-ip_local_traffic_manager
- big-ip_advanced_firewall_manager
- big-ip_access_policy_manager
debian
- debian_linux
canonical
- ubuntu_linux
redhat
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux_server_eus
- openshift_container_platform
- enterprise_linux_eus
- enterprise_linux_server_aus
- enterprise_linux
linux
- linux_kernel