6.8 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
2.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:M/Au:S/C:P/I:N/A:N
kernel is vulnerable to information disclosure. An L2 guest may trick the L0 hypervisor to access confidential L1 resources.
access.redhat.com/errata/RHSA-2020:2102
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1805135
git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec
git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c
git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d
linux.oracle.com/errata/ELSA-2020-5540.html
linux.oracle.com/errata/ELSA-2020-5542.html
linux.oracle.com/errata/ELSA-2020-5543.html
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
www.debian.org/security/2020/dsa-4667
www.debian.org/security/2020/dsa-4698
www.openwall.com/lists/oss-security/2020/02/25/3
www.spinics.net/lists/kvm/msg208259.html
6.8 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
2.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:A/AC:M/Au:S/C:P/I:N/A:N