{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T18:34:36.735","vulnerabilities":[{"cve":{"id":"CVE-2019-1010066","sourceIdentifier":"josh@bress.net","published":"2019-07-18T14:15:11.407","lastModified":"2024-11-21T04:17:57.440","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order to write to model specific registers, normally a function reserved for the root user. The fixed version is: v1.2.0."},{"lang":"es","value":"El laboratorio nacional Lawrence Livermore msr-safe v1.1.0 se ve afectado por: Control de acceso incorrecto. El impacto es: Un atacante podría modificar registros específicos del modelo. El componente es: manejo de ioctl. El vector de ataque es: Un atacante podría explotar un error en la comprobación de la lista blanca de la interfaz ioctl, para escribir en registros específicos del modelo, normalmente una función reservada para el usuario raíz. La versión fija es: v1.2.0."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"},{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:llnl:model_specific_registers-safe:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"E302830C-15C6-4FCD-BFAA-F86C4BB92B05"}]}]}],"references":[{"url":"https://github.com/LLNL/msr-safe/compare/v1.1.0...v1.2.0","source":"josh@bress.net","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tldp.org/LDP/lkmpg/2.4/html/x856.html","source":"josh@bress.net","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/LLNL/msr-safe/compare/v1.1.0...v1.2.0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.tldp.org/LDP/lkmpg/2.4/html/x856.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}