CVE-2019-5489
Kernel: page cache side channel attacks
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
La implementación mincore() en mm/mincore.c en el kernel de Linux hasta la versión 4.19.13 permitía a los atacantes observar patrones de acceso a las páginas de caché de otros procesos en el mismo sistema, permitiendo el esnifado de información secreta. (Su arreglo afecta a la salida del programa fincore.) Puede ser posible una explotación remota limitada, tal y como queda demostrado con las diferencias en latencia a la hora de acceder a archivos públicos desde un servidor Apache HHTP.
A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-07 CVE Reserved
- 2019-01-07 CVE Published
- 2021-10-02 First Exploit
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-319: Cleartext Transmission of Sensitive Information
CAPEC
References (35)
URL | Tag | Source |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en | X_refsource_confirm | |
http://www.securityfocus.com/bid/106478 | Third Party Advisory | |
https://arxiv.org/abs/1901.01161 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html | Mailing List | |
https://seclists.org/bugtraq/2019/Jun/26 | Mailing List | |
https://security.netapp.com/advisory/ntap-20190307-0001 | Third Party Advisory | |
https://www.oracle.com/security-alerts/cpujul2020.html | X_refsource_misc | |
https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache | Technical Description |
URL | Date | SRC |
---|---|---|
https://github.com/mmxsrup/CVE-2019-5489 | 2021-10-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.19.13 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.19.13" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Active Iq Performance Analytics Services Search vendor "Netapp" for product "Active Iq Performance Analytics Services" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Element Software Management Node Search vendor "Netapp" for product "Element Software Management Node" | - | - |
Affected
|