Oval Definition:oval:com.ubuntu.disco:def:201938870000000
Revision Date:2019-04-09Version:1
Title:CVE-2019-3887 on Ubuntu 19.04 (disco) - medium.
Description:A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue. Marc Orr discovered that the KVM hypervisor implementation in the Linux kernel did not properly restrict APIC MSR register values when nested virtualization is used. An attacker in a guest vm could use this to cause a denial of service (host OS crash).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2019-3887
Platform(s):Ubuntu 19.04
Product(s):
Definition Synopsis
  • Ubuntu 19.04 (disco) is installed.
  • AND Package Information
  • linux package in disco was vulnerable but has been fixed (note: '5.0.0-15.16').
  • OR linux-aws package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-azure package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-gcp package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-kvm package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-meta package in disco was vulnerable but has been fixed (note: '5.0.0-15.16').
  • OR linux-meta-aws package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-meta-azure package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-meta-gcp package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-meta-kvm package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-meta-oem package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1021.24').
  • OR linux-meta-oracle package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1007.9').
  • OR linux-meta-raspi2 package in disco was vulnerable but has been fixed (note: '5.0.0-1008.8').
  • OR linux-oem package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1021.24').
  • OR linux-oracle package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1007.9').
  • OR linux-raspi2 package in disco was vulnerable but has been fixed (note: '5.0.0-1008.8').
  • OR linux-signed package in disco was vulnerable but has been fixed (note: '5.0.0-15.16').
  • OR linux-signed-azure package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-signed-gcp package in disco was vulnerable but has been fixed (note: '5.0.0-1006.6').
  • OR linux-signed-oem package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1021.24').
  • OR linux-signed-oracle package in disco, is related to the CVE in some way and has been fixed (note: '4.15.0-1007.9').
  • OR linux-snapdragon package in disco was vulnerable but has been fixed (note: '5.0.0-1012.12').
  • BACK