CVE-2019-15031

MEDIUM

Linux kernel <5.2.14 - Info Disclosure

Title source: llm
STIX 2.1

Description

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.

Scores

CVSS v3 4.4
EPSS 0.0005
EPSS Percentile 15.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

Details

CWE
CWE-662
Status published
Products (10)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 19.04
linux/linux_kernel < 5.2.14
opensuse/leap 15.0
opensuse/leap 15.1
redhat/enterprise_linux 7.0
redhat/enterprise_linux 8.0
Published Sep 13, 2019
Tracked Since Feb 18, 2026