CVE-2019-3016
Detail
Modified
This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.
Description
In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
CVE, Oracle
http://www.openwall.com/lists/oss-security/2020/01/30/4
CVE, Oracle
Mailing List
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1792167
CVE, Oracle
Issue Tracking
Third Party Advisory
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
CVE, Oracle
Patch
Vendor Advisory
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
CVE, Oracle
Patch
Vendor Advisory
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
CVE, Oracle
Patch
Vendor Advisory
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
CVE, Oracle
Patch
Vendor Advisory
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
CVE, Oracle
Patch
Vendor Advisory
https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
CVE, Oracle
https://security.netapp.com/advisory/ntap-20200313-0003/
CVE, Oracle
https://usn.ubuntu.com/4300-1/
CVE, Oracle
https://usn.ubuntu.com/4301-1/
CVE, Oracle
https://www.debian.org/security/2020/dsa-4699
CVE, Oracle
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
NIST
Oracle
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Oracle
Change History
10 change records found show changes
CVE Modified by CVE 11/20/2024 11:41:59 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
Added
Reference
http://www.openwall.com/lists/oss-security/2020/01/30/4
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1792167
Added
Reference
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
Added
Reference
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
Added
Reference
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
Added
Reference
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
Added
Reference
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
Added
Reference
https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
Added
Reference
https://security.netapp.com/advisory/ntap-20200313-0003/
Added
Reference
https://usn.ubuntu.com/4300-1/
Added
Reference
https://usn.ubuntu.com/4301-1/
Added
Reference
https://www.debian.org/security/2020/dsa-4699
CVE Modified by Oracle 5/14/2024 1:59:05 AM
Action
Type
Old Value
New Value
CVE Modified by Oracle 11/06/2023 10:09:46 PM
Action
Type
Old Value
New Value
Added
Reference
Oracle https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/ [No types assigned]
Removed
Reference
Oracle https://lore.kernel.org/lkml/[email protected] /
CVE Modified by Oracle 6/10/2020 4:15:12 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.debian.org/security/2020/dsa-4699 [No Types Assigned]
CVE Modified by Oracle 4/14/2020 10:15:13 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html [No Types Assigned]
CVE Modified by Oracle 4/02/2020 8:15:11 PM
Action
Type
Old Value
New Value
Added
Reference
https://usn.ubuntu.com/4301-1/ [No Types Assigned]
CVE Modified by Oracle 3/19/2020 5:15:16 PM
Action
Type
Old Value
New Value
Added
Reference
https://usn.ubuntu.com/4300-1/ [No Types Assigned]
CVE Modified by Oracle 3/13/2020 6:15:12 AM
Action
Type
Old Value
New Value
Added
Reference
https://security.netapp.com/advisory/ntap-20200313-0003/ [No Types Assigned]
Initial Analysis by NIST 2/07/2020 11:29:20 AM
Action
Type
Old Value
New Value
Added
CVSS V3.1
NIST AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Added
CVSS V2
NIST (AV:L/AC:M/Au:N/C:P/I:N/A:N)
Added
CWE
NIST CWE-362
Added
CPE Configuration
OR
*cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*
*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.16
Changed
Reference Type
http://www.openwall.com/lists/oss-security/2020/01/30/4 No Types Assigned
http://www.openwall.com/lists/oss-security/2020/01/30/4 Mailing List, Third Party Advisory
Changed
Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1792167 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1792167 Issue Tracking, Third Party Advisory
Changed
Reference Type
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7 No Types Assigned
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7 Patch, Vendor Advisory
Changed
Reference Type
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e No Types Assigned
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e Patch, Vendor Advisory
Changed
Reference Type
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589 No Types Assigned
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589 Patch, Vendor Advisory
Changed
Reference Type
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e No Types Assigned
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e Patch, Vendor Advisory
Changed
Reference Type
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796 No Types Assigned
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796 Patch, Vendor Advisory
Changed
Reference Type
https://lore.kernel.org/lkml/[email protected] / No Types Assigned
https://lore.kernel.org/lkml/[email protected] / Vendor Advisory
CVE Modified by Oracle 2/04/2020 9:15:12 AM
Action
Type
Old Value
New Value
Added
Reference
http://www.openwall.com/lists/oss-security/2020/01/30/4 [No Types Assigned]
Added
Reference
https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7 [No Types Assigned]
Added
Reference
https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e [No Types Assigned]
Added
Reference
https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589 [No Types Assigned]
Added
Reference
https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e [No Types Assigned]
Added
Reference
https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796 [No Types Assigned]
Removed
Reference
https://www.openwall.com/lists/oss-security/2020/01/30/4 [No Types Assigned]
Quick Info
CVE Dictionary Entry: CVE-2019-3016 NVD
Published Date: 01/31/2020 NVD
Last Modified: 11/20/2024
Source: Oracle