First published: Sat Feb 02 2019(Updated: )
An information leakage issue was found in the way Linux kernel's KVM hypervisor handled page fault exception while emulating instructions like VMXON, VMCLEAR, VMPTRLD, VMWRITE with memory address as an operand. It occurs if the operand is an mmio address, as the returned exception object holds uninitialised stack memory contents. A guest user/process could use this flaw to leak host's stack memory contents to a guest. It affects only Intel processors and only when nested virtualization is enabled. Upstream patch: --------------- -> <a href="https://git.kernel.org/linus/353c0956a618a07ba4bbe7ad00ff29fe70e8412a">https://git.kernel.org/linus/353c0956a618a07ba4bbe7ad00ff29fe70e8412a</a> Reference: ---------- -> <a href="https://www.openwall.com/lists/oss-security/2019/02/18/2">https://www.openwall.com/lists/oss-security/2019/02/18/2</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
redhat/kernel-rt | <0:4.18.0-147.rt24.93.el8 | 0:4.18.0-147.rt24.93.el8 |
redhat/kernel | <0:4.18.0-147.el8 | 0:4.18.0-147.el8 |
Linux Kernel | <=4.20.5 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
openSUSE | =15.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
NetApp Active IQ | ||
NetApp Element Software | ||
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux eus | =8.6 | |
redhat enterprise Linux for real time | =7 | |
redhat enterprise Linux for real time | =8 | |
redhat enterprise Linux for real time for nfv | =7 | |
redhat enterprise Linux for real time for nfv tus | =8.2 | |
redhat enterprise Linux for real time for nfv tus | =8.4 | |
redhat enterprise Linux for real time for nfv tus | =8.6 | |
redhat enterprise Linux for real time tus | =8.2 | |
redhat enterprise Linux for real time tus | =8.4 | |
redhat enterprise Linux for real time tus | =8.6 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server aus | =8.6 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
redhat enterprise Linux server tus | =8.6 | |
redhat enterprise Linux workstation | =7.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Fedora | =28 | |
Fedora | =29 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-7222 has been classified as a medium severity vulnerability.
To mitigate CVE-2019-7222, update your kernel to the version specified in the remedy for your Linux distribution.
CVE-2019-7222 affects various versions of the Linux kernel, specifically those up to 4.20.5.
To determine if your system is vulnerable to CVE-2019-7222, check the Linux kernel version against the affected versions.
CVE-2019-7222 impacts the Linux kernel, impacting systems running various distributions like Red Hat, Fedora, Debian, and Ubuntu.