5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
kernel is vulnerable to authorization bypass. The vulnerability exists through the mishandling of indirect calls weakens Spectre mitigation for paravirtual guests.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd
lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
www.securityfocus.com/bid/105120
www.securitytracker.com/id/1041601
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1335986
bugzilla.redhat.com/show_bug.cgi?id=1436351
bugzilla.redhat.com/show_bug.cgi?id=1537033
bugzilla.redhat.com/show_bug.cgi?id=1552203
bugzilla.redhat.com/show_bug.cgi?id=1577640
bugzilla.redhat.com/show_bug.cgi?id=1590228
bugzilla.redhat.com/show_bug.cgi?id=1593417
bugzilla.redhat.com/show_bug.cgi?id=1608955
bugzilla.redhat.com/show_bug.cgi?id=1609699
bugzilla.redhat.com/show_bug.cgi?id=1613056
bugzilla.redhat.com/show_bug.cgi?id=1616109
bugzilla.redhat.com/show_bug.cgi?id=1616425
bugzilla.redhat.com/show_bug.cgi?id=1622167
bugzilla.redhat.com/show_bug.cgi?id=1627563
bugzilla.redhat.com/show_bug.cgi?id=1628378
bugzilla.redhat.com/show_bug.cgi?id=1659146
bugzilla.redhat.com/show_bug.cgi?id=1665990
bugzilla.redhat.com/show_bug.cgi?id=1684780
bugzilla.redhat.com/show_bug.cgi?id=1693457
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
github.com/torvalds/linux/commit/5800dc5c19f34e6e03b5adab1282535cb102fafd
lists.debian.org/debian-lts-announce/2018/10/msg00003.html
twitter.com/grsecurity/status/1029324426142199808
usn.ubuntu.com/3775-1/
usn.ubuntu.com/3775-2/
usn.ubuntu.com/3776-1/
usn.ubuntu.com/3776-2/
usn.ubuntu.com/3777-1/
usn.ubuntu.com/3777-2/
usn.ubuntu.com/3777-3/
www.debian.org/security/2018/dsa-4308
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N