5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
kernel is vulnerable to information disclosure. The vulnerability exists through page cache side channel attacks.
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
www.securityfocus.com/bid/106478
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:2029
access.redhat.com/errata/RHSA-2019:2043
access.redhat.com/errata/RHSA-2019:2473
access.redhat.com/errata/RHSA-2019:2808
access.redhat.com/errata/RHSA-2019:2809
access.redhat.com/errata/RHSA-2019:2837
access.redhat.com/errata/RHSA-2019:3309
access.redhat.com/errata/RHSA-2019:3517
access.redhat.com/errata/RHSA-2019:3967
access.redhat.com/errata/RHSA-2019:4056
access.redhat.com/errata/RHSA-2019:4057
access.redhat.com/errata/RHSA-2019:4058
access.redhat.com/errata/RHSA-2019:4159
access.redhat.com/errata/RHSA-2019:4164
access.redhat.com/errata/RHSA-2019:4255
access.redhat.com/errata/RHSA-2020:0204
access.redhat.com/security/updates/classification/#important
arxiv.org/abs/1901.01161
bugzilla.redhat.com/show_bug.cgi?id=1335986
bugzilla.redhat.com/show_bug.cgi?id=1436351
bugzilla.redhat.com/show_bug.cgi?id=1537033
bugzilla.redhat.com/show_bug.cgi?id=1552203
bugzilla.redhat.com/show_bug.cgi?id=1577640
bugzilla.redhat.com/show_bug.cgi?id=1590228
bugzilla.redhat.com/show_bug.cgi?id=1593417
bugzilla.redhat.com/show_bug.cgi?id=1608955
bugzilla.redhat.com/show_bug.cgi?id=1609699
bugzilla.redhat.com/show_bug.cgi?id=1613056
bugzilla.redhat.com/show_bug.cgi?id=1616109
bugzilla.redhat.com/show_bug.cgi?id=1616425
bugzilla.redhat.com/show_bug.cgi?id=1622167
bugzilla.redhat.com/show_bug.cgi?id=1627563
bugzilla.redhat.com/show_bug.cgi?id=1628378
bugzilla.redhat.com/show_bug.cgi?id=1659146
bugzilla.redhat.com/show_bug.cgi?id=1665990
bugzilla.redhat.com/show_bug.cgi?id=1684780
bugzilla.redhat.com/show_bug.cgi?id=1693457
bugzilla.suse.com/show_bug.cgi?id=1120843
github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
lists.debian.org/debian-lts-announce/2019/06/msg00010.html
lists.debian.org/debian-lts-announce/2019/06/msg00011.html
seclists.org/bugtraq/2019/Jun/26
security.netapp.com/advisory/ntap-20190307-0001/
www.debian.org/security/2019/dsa-4465
www.oracle.com/security-alerts/cpujul2020.html
www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N