Red Hat Enterprise Linux 7.4 Extended Update Support update for kernel



Risk High
Patch available YES
Number of vulnerabilities 15
CVE-ID CVE-2016-7913
CVE-2016-8633
CVE-2017-1000407
CVE-2017-11600
CVE-2017-12190
CVE-2017-13215
CVE-2017-16939
CVE-2017-17558
CVE-2018-1068
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2018-18559
CVE-2018-3665
CVE-2019-11091
CWE-ID CWE-416
CWE-16
CWE-399
CWE-125
CWE-401
CWE-264
CWE-787
CWE-200
CWE-362
Exploitation vector Network
Public exploit Public exploit code for vulnerability #7 is available.
Public exploit code for vulnerability #13 is available.
Vulnerable software
Subscribe
Red Hat Enterprise Linux Server - TUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, little endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for Power, big endian - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - AUS
Operating systems & Components / Operating system

Red Hat Enterprise Linux Server - Extended Update Support
Operating systems & Components / Operating system

Red Hat Enterprise Linux EUS Compute Node
Operating systems & Components / Operating system

kernel (Red Hat package)
Operating systems & Components / Operating system package or component

Vendor Red Hat Inc.

Security Bulletin

This security bulletin contains information about 15 vulnerabilities.

1) Use-after-free error

EUVDB-ID: #VU12260

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-7913

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.

The weakness exists in the xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c due to use-after-free error. A local attacker can trigger memory corruption via vectors involving omission of the firmware name from a certain data structure, cause the service to crash or gain root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Configuration error

EUVDB-ID: #VU12261

Risk: High

CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-8633

CWE-ID: CWE-16 - Configuration

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists in drivers/firewire/net.c due to using certain unusual hardware configurations. A remote attacker can execute arbitrary code via specially crafted fragmented packets.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource management error

EUVDB-ID: #VU9655

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-1000407

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to the possibility of flooding the diagnostic port 0x80. A local user can trigger an exception and cause a kernel panic.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds read

EUVDB-ID: #VU8131

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-11600

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in net/xfrm/xfrm_policy.c due to it does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less when CONFIG_XFRM_MIGRATE is enabled. A local attacker can submit a specially crafted XFRM_MSG_MIGRATE xfrm Netlink message and cause the service to crash.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Memory leak

EUVDB-ID: #VU10709

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12190

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to an out-of-memory condition. A local attacker can cause a memory leak and possible system lock up.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Privilege escalation

EUVDB-ID: #VU10938

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-13215

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to a flaw in the Upstream kernel skcipher. A remote attacker can trick the victim into opening a specially crafted application and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Use-after-free error

EUVDB-ID: #VU9601

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2017-16939

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists in the XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel due to use-after-free error. A local attacker can make a specially crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages, trigger memory corruption and cause the service to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

8) Out-of-bounds write

EUVDB-ID: #VU9771

Risk: Low

CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-17558

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to the usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel does not consider the maximum number of configurations and interfaces before attempting to release resources. A local attacker can supply specially crafted USB device, trigger out-of-bounds write access and cause the system to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Privilege escalation

EUVDB-ID: #VU11145

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1068

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to an error in the implementation of 32 bit syscall interface. A local attacker can gain root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Information disclosure

EUVDB-ID: #VU28397

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-12126

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local authenticated user to gain access to sensitive information.

Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Information disclosure

EUVDB-ID: #VU28395

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-12127

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local authenticated user to gain access to sensitive information.

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Information disclosure

EUVDB-ID: #VU28396

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-12130

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local authenticated user to gain access to sensitive information.

Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Privilege escalation

EUVDB-ID: #VU15526

Risk: Low

CVSSv3.1: 7.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-18559

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of a certain multithreaded case involving packet_do_bind unregister and packet_notifier register actions after a race condition between fanout_add, from setsockopt, and a bind on an AF_PACKET socket. A local attacker can execute a program or file that submits malicious input, trigger a use-after-free condition and execute arbitrary code with kernel privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

14) Side-channel attack

EUVDB-ID: #VU13337

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-3665

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local attacker to obtain potentially sensitive information.

The vulnerability exists due to utilizing the Lazy FP state restore technique for floating point state when context switching between application processes. A local attacker can conduct cache side-channel attacks and determine register values of other processes.

Note: This vulnerability is known as LazyFP.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Information disclosure

EUVDB-ID: #VU28398

Risk: Low

CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-11091

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local authenticated user to gain access to sensitive information.

Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Red Hat Enterprise Linux Server - TUS: 7.4

Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4

Red Hat Enterprise Linux Server - AUS: 7.4

Red Hat Enterprise Linux Server - Extended Update Support: 7.4

Red Hat Enterprise Linux EUS Compute Node: 7.4

kernel (Red Hat package): before 3.10.0-693.47.2.el7

CPE2.3 External links

http://access.redhat.com/errata/RHSA-2019:1170


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###