CVE-2018-19407

The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
References
Link Resource
https://lkml.org/lkml/2018/11/20/580 Patch Third Party Advisory
http://www.securityfocus.com/bid/105987 Third Party Advisory VDB Entry
https://usn.ubuntu.com/3872-1/ Third Party Advisory
https://usn.ubuntu.com/3871-1/ Third Party Advisory
https://usn.ubuntu.com/3879-2/ Third Party Advisory
https://usn.ubuntu.com/3879-1/ Third Party Advisory
https://usn.ubuntu.com/3878-1/ Third Party Advisory
https://usn.ubuntu.com/3871-4/ Third Party Advisory
https://usn.ubuntu.com/3871-3/ Third Party Advisory
https://usn.ubuntu.com/3878-2/ Third Party Advisory
https://usn.ubuntu.com/3871-5/ Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
Configurations

Configuration 1

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Information

Published : 2018-11-21 12:29

Updated : 2019-03-21 04:00


NVD link : CVE-2018-19407

Mitre link : CVE-2018-19407

Products Affected
No products.
CWE