{"id":"CVE-2019-1010066","details":"Lawrence Livermore National Laboratory msr-safe v1.1.0 is affected by: Incorrect Access Control. The impact is: An attacker could modify model specific registers. The component is: ioctl handling. The attack vector is: An attacker could exploit a bug in ioctl interface whitelist checking, in order to write to model specific registers, normally a function reserved for the root user. The fixed version is: v1.2.0.","modified":"2026-03-14T09:30:47.459801Z","published":"2019-07-18T14:15:11.407Z","references":[{"type":"FIX","url":"https://github.com/LLNL/msr-safe/compare/v1.1.0...v1.2.0"},{"type":"EVIDENCE","url":"https://www.tldp.org/LDP/lkmpg/2.4/html/x856.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/llnl/msr-safe","events":[{"introduced":"0"},{"last_affected":"9b6749624147c6674a5c741ff9fedcc329c523e1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.1.0"}]}}],"versions":["v1.0.2","v1.1.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010066.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}