CVE-2018-15594

Public on 2019-09-13
Modified on 2019-10-23
Description
It was found that paravirt_patch_call/jump() functions in the arch/x86/kernel/paravirt.c in the Linux kernel mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtualized guests.
Severity
Medium
CVSS v3 Base Score
5.6
See breakdown

Affected Packages

Platform Package Release Date Advisory
Amazon Linux 2 kernel 2019-09-13 23:13 ALAS2-2019-1281
Amazon Linux 2 kernel 2019-09-13 23:09 ALAS2-2019-1280
Amazon Linux 2 kernel 2019-09-13 23:13 ALAS2-2019-1281
Amazon Linux 2 kernel 2019-09-13 23:09 ALAS2-2019-1280
Amazon Linux 1 kernel 2019-09-13 22:45 ALAS-2019-1280

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
NVD CVSSv2 2.1 AV:L/AC:L/Au:N/C:P/I:N/A:N
NVD CVSSv3 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N