Out-of-bounds write in Linux kernel



Published: 2020-01-09 | Updated: 2020-06-01
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-19332
CWE-ID CWE-787
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Out-of-bounds write

EUVDB-ID: #VU28404

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-19332

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local authenticated user to damange or delete data.

An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.4 - 5.4.42


CPE2.3 External links

http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.89
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.16
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.3
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.159
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.207
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.207
http://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###