Vulnerability Description
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 5.2.14 |
| Canonical | Ubuntu Linux | 16.04 |
| Opensuse | Leap | 15.0 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2019/09/10/3Mailing ListPatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0740
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=82ExploitMailing ListPatch
- https://security.netapp.com/advisory/ntap-20191004-0001/Third Party Advisory
- https://usn.ubuntu.com/4135-1/Third Party Advisory
- https://usn.ubuntu.com/4135-2/Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.htmlThird Party Advisory
- http://www.openwall.com/lists/oss-security/2019/09/10/3Mailing ListPatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2020:0740
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=82ExploitMailing ListPatch
- https://security.netapp.com/advisory/ntap-20191004-0001/Third Party Advisory
- https://usn.ubuntu.com/4135-1/Third Party Advisory
FAQ
What is CVE-2019-15030?
CVE-2019-15030 is a vulnerability with a CVSS score of 4.4 (MEDIUM). In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local ...
How severe is CVE-2019-15030?
CVE-2019-15030 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-15030?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Opensuse Leap, Redhat Enterprise Linux.