Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3016

Опубликовано: 31 янв. 2020
Источник: debian
EPSS Низкий

Описание

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.4.19-1package
linuxnot-affectedstretchpackage
linuxnot-affectedjessiepackage

EPSS

Процентиль: 17%
0.00053
Низкий

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS3: 2.5
redhat
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS3: 6.2
nvd
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS3: 4.7
msrc
больше 4 лет назад

Описание отсутствует

github
около 3 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

EPSS

Процентиль: 17%
0.00053
Низкий