[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2019-3016Date: (C)2020-02-03   (M)2024-04-19


In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 4.7CVSS Score : 1.9
Exploit Score: 1.0Exploit Score: 3.4
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
DSA-4699
USN-4300-1
USN-4301-1
http://www.openwall.com/lists/oss-security/2020/01/30/4
http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
https://bugzilla.redhat.com/show_bug.cgi?id=1792167
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
https://security.netapp.com/advisory/ntap-20200313-0003/

CPE    2
cpe:/o:linux:linux_kernel
cpe:/o:linux:linux_kernel:4.10
CWE    1
CWE-362
OVAL    14
oval:org.secpod.oval:def:69816
oval:org.secpod.oval:def:1504455
oval:org.secpod.oval:def:503825
oval:org.secpod.oval:def:604882
...

© SecPod Technologies