In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4699-1 | linux security update |
EUVD |
EUVD-2019-12655 | In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out. |
Ubuntu USN |
USN-4300-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4301-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 30 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2024-09-30T15:47:55.260Z
Reserved: 2018-12-14T00:00:00
Link: CVE-2019-3016
Updated: 2024-08-04T19:12:09.651Z
Status : Modified
Published: 2020-01-31T20:15:11.070
Modified: 2024-11-21T04:41:59.773
Link: CVE-2019-3016
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN