Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-3016

Опубликовано: 30 янв. 2020
Источник: redhat
CVSS3: 2.5
EPSS Низкий

Описание

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

A flaw was found in the way Linux kernel's KVM hypervisor handled deferred TLB flush requests from guest. A race condition may occur between the guest issuing a deferred TLB flush request to KVM, and then KVM handling and acknowledging it. This may result in invalid address translations from TLB being used to access guest memory, leading to a potential information leakage issue. An attacker may use this flaw to access guest memory locations that it should not have access to.

Меры по смягчению последствий

This issue can only be resolved by applying updates. Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise MRG 2kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2020:301621.07.2020
Red Hat Enterprise Linux 8kernelFixedRHSA-2020:301021.07.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-362->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1792167kernel: kvm: Information leak within a KVM guest

EPSS

Процентиль: 17%
0.00053
Низкий

2.5 Low

CVSS3

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS3: 6.2
nvd
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

CVSS3: 4.7
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.2
debian
больше 5 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest k ...

github
около 3 лет назад

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.

EPSS

Процентиль: 17%
0.00053
Низкий

2.5 Low

CVSS3