ShaikUsaf / linux-4.19.72_CVE-2020-14356

Other
0 stars 0 forks source link

CVE-2019-3016 (Medium) detected in linuxlinux-4.19.238 #302

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2019-3016 - Medium Severity Vulnerability

Vulnerable Library - linuxlinux-4.19.238

The Linux Kernel

Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux

Found in HEAD commit: 05c0743befb9102e2ecb9fbd0fa8eb43eb8bb5ec

Found in base branch: master

Vulnerable Source Files (3)

/include/linux/kvm_types.h /include/linux/kvm_types.h /include/linux/kvm_types.h

Vulnerability Details

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

Publish Date: 2020-01-31

URL: CVE-2019-3016

CVSS 3 Score Details (4.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3016

Release Date: 2020-06-10

Fix Resolution: v5.6-rc1


Step up your Open Source Security Game with Mend here