The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability note CVE-2019-6974

Linux kernel: privilege escalation via kvm_ioctl_create_device

Synthesis of the vulnerability

An attacker can bypass restrictions via kvm_ioctl_create_device() of the Linux kernel, in order to escalate his privileges.
Vulnerable products: Debian, BIG-IP Hardware, TMOS, Fedora, Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this weakness: 2/4.
Consequences of a hack: administrator access/rights, privileged access/rights.
Hacker's origin: user shell.
Creation date: 13/02/2019.
Références of this bulletin: CERTFR-2019-AVI-131, CERTFR-2019-AVI-145, CERTFR-2019-AVI-183, CERTFR-2019-AVI-233, CVE-2019-6974, DLA-1731-1, DLA-1731-2, DLA-1771-1, FEDORA-2019-164946aa7f, FEDORA-2019-3da64f3e61, K11186236, openSUSE-SU-2019:0203-1, RHSA-2019:0818-01, RHSA-2019:0833-01, SUSE-SU-2019:0541-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:0767-1, SUSE-SU-2019:0828-1, SUSE-SU-2019:0901-1, SUSE-SU-2019:1289-1, USN-3930-1, USN-3930-2, USN-3931-1, USN-3931-2, USN-3932-1, USN-3932-2, USN-3933-1, USN-3933-2, VIGILANCE-VUL-28494.

Description of the vulnerability

An attacker can bypass restrictions via kvm_ioctl_create_device() of the Linux kernel, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerabilities workaround. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.