Risk | High |
Patch available | YES |
Number of vulnerabilities | 15 |
CVE-ID | CVE-2016-7913 CVE-2016-8633 CVE-2017-1000407 CVE-2017-11600 CVE-2017-12190 CVE-2017-13215 CVE-2017-16939 CVE-2017-17558 CVE-2018-1068 CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-18559 CVE-2018-3665 CVE-2019-11091 |
CWE-ID | CWE-416 CWE-16 CWE-399 CWE-125 CWE-401 CWE-264 CWE-787 CWE-200 CWE-362 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #13 is available. |
Vulnerable software Subscribe |
Red Hat Enterprise Linux Server - TUS Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, little endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for Power, big endian - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux for IBM z Systems - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux Server - AUS Operating systems & Components / Operating system Red Hat Enterprise Linux Server - Extended Update Support Operating systems & Components / Operating system Red Hat Enterprise Linux EUS Compute Node Operating systems & Components / Operating system kernel (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 15 vulnerabilities.
EUVDB-ID: #VU12260
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-7913
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition or gain elevated privileges on the target system.
The weakness exists in the xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c due to use-after-free error. A local attacker can trigger memory corruption via vectors involving omission of the firmware name from a certain data structure, cause the service to crash or gain root privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU12261
Risk: High
CVSSv3.1: 8.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-8633
CWE-ID:
CWE-16 - Configuration
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in drivers/firewire/net.c due to using certain unusual hardware configurations. A remote attacker can execute arbitrary code via specially crafted fragmented packets.
Successful exploitation of the vulnerability may result in system compromise.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9655
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-1000407
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service attack.
The vulnerability exists due to the possibility of flooding the diagnostic port 0x80. A local user can trigger an exception and cause a kernel panic.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU8131
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-11600
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in net/xfrm/xfrm_policy.c due to it does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less when CONFIG_XFRM_MIGRATE is enabled. A local attacker can submit a specially crafted XFRM_MSG_MIGRATE xfrm Netlink message and cause the service to crash.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10709
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-12190
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to an out-of-memory condition. A local attacker can cause a memory leak and possible system lock up.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU10938
Risk: High
CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-13215
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain elevated privileges on the target system.
The weakness exists due to a flaw in the Upstream kernel skcipher. A remote attacker can trick the victim into opening a specially crafted application and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9601
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2017-16939
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in the XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel due to use-after-free error. A local attacker can make a specially crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages, trigger memory corruption and cause the service to crash.
Successful exploitation of the vulnerability results in denial of service.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU9771
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-17558
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists due to the usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel does not consider the maximum number of configurations and interfaces before attempting to release resources. A local attacker can supply specially crafted USB device, trigger out-of-bounds write access and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU11145
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-1068
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to an error in the implementation of 32 bit syscall interface. A local attacker can gain root privileges.
Install updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28397
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-12126
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to gain access to sensitive information.
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28395
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-12127
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to gain access to sensitive information.
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28396
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-12130
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to gain access to sensitive information.
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU15526
Risk: Low
CVSSv3.1: 7.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2018-18559
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper handling of a certain multithreaded case involving packet_do_bind unregister and packet_notifier register actions after a race condition between fanout_add, from setsockopt, and a bind on an AF_PACKET socket. A local attacker can execute a program or file that submits malicious input, trigger a use-after-free condition and execute arbitrary code with kernel privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU13337
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-3665
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists due to utilizing the Lazy FP state restore technique for floating point state when context switching between application processes. A local attacker can conduct cache side-channel attacks and determine register values of other processes.
Note: This vulnerability is known as LazyFP.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28398
Risk: Low
CVSSv3.1: 4.9 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-11091
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to gain access to sensitive information.
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - TUS: 7.4
Red Hat Enterprise Linux for Power, little endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for Power, big endian - Extended Update Support: 7.4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support: 7.4
Red Hat Enterprise Linux Server - AUS: 7.4
Red Hat Enterprise Linux Server - Extended Update Support: 7.4
Red Hat Enterprise Linux EUS Compute Node: 7.4
kernel (Red Hat package): before 3.10.0-693.47.2.el7
CPE2.3http://access.redhat.com/errata/RHSA-2019:1170
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.