hshivhare67 / Kernel_4.1.15_CVE-2020-25668

Other
0 stars 0 forks source link

CVE-2019-3016 (Medium) detected in linux-stable-rtv4.1 #1094

Open mend-bolt-for-github[bot] opened 9 months ago

mend-bolt-for-github[bot] commented 9 months ago

CVE-2019-3016 - Medium Severity Vulnerability

Vulnerable Library - linux-stable-rtv4.1

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/zanussi/linux-stable-rt.git

Found in HEAD commit: 9cafd1b39d091c76656512d15c90a6952f088074

Found in base branch: master

Vulnerable Source Files (2)

/include/linux/kvm_types.h /include/linux/kvm_types.h

Vulnerability Details

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

Publish Date: 2020-01-31

URL: CVE-2019-3016

CVSS 3 Score Details (4.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-3016

Release Date: 2020-06-10

Fix Resolution: v5.6-rc1


Step up your Open Source Security Game with Mend here

mend-bolt-for-github[bot] commented 5 months ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.