{"api_version":"1","generated_at":"2026-04-23T04:20:56+00:00","cve":"CVE-2019-3016","urls":{"html":"https://cve.report/CVE-2019-3016","api":"https://cve.report/api/cve/CVE-2019-3016.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-3016","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-3016"},"summary":{"title":"CVE-2019-3016","description":"In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.","state":"PUBLIC","assigner":"secalert_us@oracle.com","published_at":"2020-01-31 20:15:00","updated_at":"2023-11-07 03:09:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7","name":"https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796","name":"https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini@redhat.com/","name":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini@redhat.com/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"[FYI PATCH 0/5] Missing TLB flushes - Paolo Bonzini","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589","name":"https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4300-1/","name":"USN-4300-1","refsource":"UBUNTU","tags":[],"title":"USN-4300-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2020/dsa-4699","name":"DSA-4699","refsource":"DEBIAN","tags":[],"title":"Debian -- Security Information -- DSA-4699-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2020/01/30/4","name":"[oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest","refsource":"MLIST","tags":["Mailing List","Third Party Advisory"],"title":"oss-security - CVE-2019-3016: information leak within a KVM guest","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4301-1/","name":"USN-4301-1","refsource":"UBUNTU","tags":[],"title":"USN-4301-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e","name":"https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e","name":"https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e","refsource":"CONFIRM","tags":["Patch","Vendor Advisory"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/","name":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/","refsource":"","tags":[],"title":"[FYI PATCH 0/5] Missing TLB flushes - Paolo Bonzini","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1792167","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1792167","refsource":"CONFIRM","tags":["Issue Tracking","Third Party Advisory"],"title":"1792167 – (CVE-2019-3016) CVE-2019-3016 kernel: kvm: Information leak within a KVM guest","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html","name":"http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html","refsource":"MISC","tags":[],"title":"Kernel Live Patch Security Notice LSN-0065-1 ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20200313-0003/","name":"https://security.netapp.com/advisory/ntap-20200313-0003/","refsource":"CONFIRM","tags":[],"title":"February 2020 Linux Kernel Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-3016","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3016","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2019","cve_id":"3016","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3016","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"4.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3016","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"3016","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"4.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2019-3016","qid":"377065","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2020:0113)"},{"cve":"CVE-2019-3016","qid":"900101","title":"CBL-Mariner Linux Security Update for kernel 5.10.52.1"},{"cve":"CVE-2019-3016","qid":"900303","title":"CBL-Mariner Linux Security Update for kernel 5.10.57.1"},{"cve":"CVE-2019-3016","qid":"900321","title":"CBL-Mariner Linux Security Update for kernel 5.10.60.1"},{"cve":"CVE-2019-3016","qid":"901473","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6519-1)"},{"cve":"CVE-2019-3016","qid":"903417","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3493)"},{"cve":"CVE-2019-3016","qid":"905785","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3493-1)"},{"cve":"CVE-2019-3016","qid":"906374","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6519-2)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2019-3016","ASSIGNER":"secalert_us@oracle.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"linux","product":{"product_data":[{"product_name":"linux_kernel","version":{"version_data":[{"version_value":"4.10 to 5.6"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-362"}]},{"description":[{"lang":"eng","value":"CWE-200"}]}]},"references":{"reference_data":[{"refsource":"MLIST","name":"[oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest","url":"http://www.openwall.com/lists/oss-security/2020/01/30/4"},{"url":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini@redhat.com/","name":"https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini@redhat.com/","refsource":"CONFIRM"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1792167","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1792167","refsource":"CONFIRM"},{"url":"https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e","name":"https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e","refsource":"CONFIRM"},{"url":"https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7","name":"https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7","refsource":"CONFIRM"},{"url":"https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589","name":"https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589","refsource":"CONFIRM"},{"url":"https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796","name":"https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796","refsource":"CONFIRM"},{"url":"https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e","name":"https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e","refsource":"CONFIRM"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20200313-0003/","url":"https://security.netapp.com/advisory/ntap-20200313-0003/"},{"refsource":"UBUNTU","name":"USN-4300-1","url":"https://usn.ubuntu.com/4300-1/"},{"refsource":"UBUNTU","name":"USN-4301-1","url":"https://usn.ubuntu.com/4301-1/"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html","url":"http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html"},{"refsource":"DEBIAN","name":"DSA-4699","url":"https://www.debian.org/security/2020/dsa-4699"}]},"description":{"description_data":[{"lang":"eng","value":"In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out."}]},"impact":{"cvss":[[{"vectorString":"6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}]]}},"nvd":{"publishedDate":"2020-01-31 20:15:00","lastModifiedDate":"2023-11-07 03:09:00","problem_types":["CWE-362"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":1,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":1.9},"severity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:4.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"3016","Ordinal":"140032","Title":"CVE-2019-3016","CVE":"CVE-2019-3016","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"3016","Ordinal":"1","NoteData":"In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"3016","Ordinal":"2","NoteData":"2020-01-31","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"3016","Ordinal":"3","NoteData":"2020-06-10","Type":"Other","Title":"Modified"}]}}}