Trinadh465 / linux-4.1.15_CVE-2018-5873

Other
0 stars 0 forks source link

CVE-2019-3016 (Medium) detected in linux-stable-rtv4.1.33 - autoclosed #816

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2019-3016 - Medium Severity Vulnerability

Vulnerable Library - linux-stable-rtv4.1.33

Julia Cartwright's fork of linux-stable-rt.git

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git

Found in HEAD commit: 32145daf0c96b012284199f23418243e0168269f

Found in base branch: main

Vulnerable Source Files (2)

/include/linux/kvm_types.h /include/linux/kvm_types.h

Vulnerability Details

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

Publish Date: 2020-01-31

URL: CVE-2019-3016

CVSS 3 Score Details (4.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3016

Release Date: 2020-06-10

Fix Resolution: v5.6-rc1


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 1 year ago

:information_source: This issue was automatically closed by Mend because it is a duplicate of an existing issue: #873