The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
References
Link | Resource |
---|---|
https://lkml.org/lkml/2018/11/20/580 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/105987 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/3872-1/ | Third Party Advisory |
https://usn.ubuntu.com/3871-1/ | Third Party Advisory |
https://usn.ubuntu.com/3879-2/ | Third Party Advisory |
https://usn.ubuntu.com/3879-1/ | Third Party Advisory |
https://usn.ubuntu.com/3878-1/ | Third Party Advisory |
https://usn.ubuntu.com/3871-4/ | Third Party Advisory |
https://usn.ubuntu.com/3871-3/ | Third Party Advisory |
https://usn.ubuntu.com/3878-2/ | Third Party Advisory |
https://usn.ubuntu.com/3871-5/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-11-20 16:29
Updated : 2019-03-21 09:00
NVD link : CVE-2018-19407
Mitre link : CVE-2018-19407
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel