CVE-2019-6974

MEDIUM

Description

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

References

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9

http://www.securityfocus.com/bid/107127

https://access.redhat.com/errata/RHBA-2019:0959

https://access.redhat.com/errata/RHSA-2019:0818

https://access.redhat.com/errata/RHSA-2019:0833

https://access.redhat.com/errata/RHSA-2019:2809

https://access.redhat.com/errata/RHSA-2019:3967

https://access.redhat.com/errata/RHSA-2020:0103

https://bugs.chromium.org/p/project-zero/issues/detail?id=1765

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8

https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156

https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html

https://support.f5.com/csp/article/K11186236

https://support.f5.com/csp/article/K11186236?utm_source=f5support&utm_medium=RSS

https://usn.ubuntu.com/3930-1/

https://usn.ubuntu.com/3930-2/

https://usn.ubuntu.com/3931-1/

https://usn.ubuntu.com/3931-2/

https://usn.ubuntu.com/3932-1/

https://usn.ubuntu.com/3932-2/

https://usn.ubuntu.com/3933-1/

https://usn.ubuntu.com/3933-2/

https://www.exploit-db.com/exploits/46388/

Details

Source: MITRE

Published: 2019-02-15

Updated: 2020-10-15

Type: CWE-362

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.2

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 13.0.0 to 13.1.1 (inclusive)

cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:* versions from 14.0.0 to 14.1.0 (inclusive)

Configuration 5

OR

cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Tenable Plugins

View all (51 total)

IDNameProductFamilySeverity
149098EulerOS 2.0 SP3 : kernel (EulerOS-SA-2021-1808)NessusHuawei Local Security Checks
high
141374OracleVM 3.4 : Unbreakable / etc (OVMSA-2020-0044)NessusOracleVM Local Security Checks
critical
141207Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2020-5866)NessusOracle Linux Local Security Checks
critical
133455Virtuozzo 7 : readykernel-patch (VZA-2019-046)NessusVirtuozzo Local Security Checks
medium
133454Virtuozzo 7 : readykernel-patch (VZA-2019-045)NessusVirtuozzo Local Security Checks
medium
133453Virtuozzo 7 : readykernel-patch (VZA-2019-042)NessusVirtuozzo Local Security Checks
medium
132886RHEL 7 : kernel (RHSA-2020:0103)NessusRed Hat Local Security Checks
medium
132554F5 Networks BIG-IP : Linux kernel KVM subsystem vulnerability (K11186236)NessusF5 Networks Local Security Checks
medium
131375RHEL 7 : kernel (RHSA-2019:3967)NessusRed Hat Local Security Checks
high
129145RHEL 7 : kernel-alt (RHSA-2019:2809)NessusRed Hat Local Security Checks
high
127302NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0086)NessusNewStart CGSL Local Security Checks
medium
127301NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0085)NessusNewStart CGSL Local Security Checks
medium
127285NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0077)NessusNewStart CGSL Local Security Checks
high
127283NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0076)NessusNewStart CGSL Local Security Checks
high
126031Slackware 14.2 / current : kernel (SSA:2019-169-01) (SACK Panic) (SACK Slowness)NessusSlackware Local Security Checks
high
125283SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1289-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)NessusSuSE Local Security Checks
high
124984EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1531)NessusHuawei Local Security Checks
high
124953EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450)NessusHuawei Local Security Checks
medium
124750EulerOS Virtualization 2.5.4 : kvm (EulerOS-SA-2019-1372)NessusHuawei Local Security Checks
medium
124595Debian DLA-1771-1 : linux-4.9 security updateNessusDebian Local Security Checks
high
124416CentOS 7 : kernel (CESA-2019:0818)NessusCentOS Local Security Checks
medium
124290Scientific Linux Security Update : kernel on SL7.x x86_64 (20190423)NessusScientific Linux Local Security Checks
medium
124259RHEL 7 : kernel-rt (RHSA-2019:0833)NessusRed Hat Local Security Checks
medium
124256RHEL 7 : kernel (RHSA-2019:0818)NessusRed Hat Local Security Checks
medium
124254Oracle Linux 7 : kernel (ELSA-2019-0818)NessusOracle Linux Local Security Checks
medium
124048Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4612)NessusOracle Linux Local Security Checks
high
123927SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0901-1)NessusSuSE Local Security Checks
high
123723EulerOS Virtualization 2.5.3 : kvm (EulerOS-SA-2019-1255)NessusHuawei Local Security Checks
medium
123682Ubuntu 14.04 LTS : linux vulnerabilities (USN-3933-1)NessusUbuntu Local Security Checks
medium
123681Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3932-2)NessusUbuntu Local Security Checks
high
123680Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3932-1)NessusUbuntu Local Security Checks
high
123679Ubuntu 14.04 LTS / 16.04 LTS : linux-hwe, linux-aws-hwe, linux-azure, linux-gcp, linux-oracle (USN-3931-2)NessusUbuntu Local Security Checks
high
123678Ubuntu 18.04 LTS : linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, (USN-3931-1)NessusUbuntu Local Security Checks
high
123677Ubuntu 18.04 LTS : linux-hwe, linux-azure vulnerabilities (USN-3930-2)NessusUbuntu Local Security Checks
high
123676Ubuntu 18.10 : linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-raspi2 (USN-3930-1)NessusUbuntu Local Security Checks
high
123635SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0828-1)NessusSuSE Local Security Checks
high
123496SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:0784-1)NessusSuSE Local Security Checks
high
123445SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0767-1)NessusSuSE Local Security Checks
high
123420Debian DLA-1731-2 : linux regression update (Spectre)NessusDebian Local Security Checks
high
123413SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:0765-1) (Spectre)NessusSuSE Local Security Checks
high
123125SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0722-1)NessusSuSE Local Security Checks
medium
123066SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0709-1)NessusSuSE Local Security Checks
medium
123061SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0683-1)NessusSuSE Local Security Checks
medium
123000SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0672-1)NessusSuSE Local Security Checks
medium
122699EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1076)NessusHuawei Local Security Checks
medium
122671Amazon Linux 2 : kernel (ALAS-2019-1165)NessusAmazon Linux Local Security Checks
medium
122609SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:0541-1)NessusSuSE Local Security Checks
high
122602Amazon Linux AMI : kernel (ALAS-2019-1165)NessusAmazon Linux Local Security Checks
medium
122303openSUSE Security Update : the Linux Kernel (openSUSE-2019-203)NessusSuSE Local Security Checks
high
122278Fedora 28 : kernel / kernel-headers / kernel-tools (2019-3da64f3e61)NessusFedora Local Security Checks
medium
122275Fedora 29 : kernel / kernel-headers / kernel-tools (2019-164946aa7f)NessusFedora Local Security Checks
medium