Executive Summary

Informations
NameCVE-2019-15030First vendor Publication2019-09-13
VendorCveLast vendor Modification2019-09-18

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:N/A:P)
Cvss Base Score3.6Attack RangeLocal
Cvss Impact Score4.9Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os3312

Sources (Detail)

SourceUrl
CONFIRM https://security.netapp.com/advisory/ntap-20191004-0001/
MISC http://www.openwall.com/lists/oss-security/2019/09/10/3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id...
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
UBUNTU https://usn.ubuntu.com/4135-1/
https://usn.ubuntu.com/4135-2/

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
DateInformations
2019-10-05 12:11:09
  • Multiple Updates
2019-10-01 01:09:45
  • Multiple Updates
2019-09-25 09:19:47
  • Multiple Updates
2019-09-25 01:11:27
  • Multiple Updates
2019-09-25 01:10:48
  • Multiple Updates
2019-09-24 21:19:23
  • Multiple Updates
2019-09-18 17:19:21
  • Multiple Updates
2019-09-17 00:19:23
  • Multiple Updates
2019-09-13 17:19:25
  • First insertion