Satheesh575555 / linux-4.1.15_CVE-2022-42703

Other
0 stars 0 forks source link

CVE-2019-3016 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed #830

Closed mend-bolt-for-github[bot] closed 6 months ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2019-3016 - Medium Severity Vulnerability

Vulnerable Library - linux-stable-rtv4.1.33

Julia Cartwright's fork of linux-stable-rt.git

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git

Found in HEAD commit: 5efa23eac0f04571d486a6f7706fccc426b46cac

Found in base branch: master

Vulnerable Source Files (2)

/include/linux/kvm_types.h /include/linux/kvm_types.h

Vulnerability Details

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

Publish Date: 2020-01-31

URL: CVE-2019-3016

CVSS 3 Score Details (4.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3016

Release Date: 2020-06-10

Fix Resolution: v5.6-rc1


Step up your Open Source Security Game with Mend here