CVE-2019-3016
Published at:
-
31-01-2020 09:15
Last modified:
-
23-01-2023 07:44
Total changes:
-
8
Description
Common Vulnerability Scoring System (CVSS)
High
Attack complexity
Local
Attack vector
None
Availability
High
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
4.7
Base score
1.0
3.6
Exploitability score
Impact score
Verification logic
Reference
- https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini@redhat.com/
- https://bugzilla.redhat.com/show_bug.cgi?id=1792167
- https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
- https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
- https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
- [oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest-Mailing List, Third Party Advisory
- https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
- https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
- https://security.netapp.com/advisory/ntap-20200313-0003/
- USN-4300-1-
- USN-4301-1-
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- DSA-4699-
Keywords