Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2017-11600 CVE-2018-3639 |
CWE-ID | CWE-125 CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
kernel-rt (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Enterprise Linux for Real Time Operating systems & Components / Operating system Red Hat Enterprise Linux for Real Time for NFV Operating systems & Components / Operating system |
Vendor |
Red Hat Inc. |
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU8131
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2017-11600
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to cause DoS condition on the target system.
The weakness exists in net/xfrm/xfrm_policy.c due to it does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less when CONFIG_XFRM_MIGRATE is enabled. A local attacker can submit a specially crafted XFRM_MSG_MIGRATE xfrm Netlink message and cause the service to crash.
Install update from vendor's website.
Vulnerable software versionskernel-rt (Red Hat package): 3.10.0-229.1.2.rt56.141.2.el7_1 - 3.10.0-862.3.3.rt56.809.el7
Red Hat Enterprise Linux for Real Time: 7
Red Hat Enterprise Linux for Real Time for NFV: 7
:
http://access.redhat.com/errata/RHSA-2018:2003
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU12911
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-3639
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The weakness exists due to race conditions in CPU cache processing. A local attacker can conduct a side-channel attack to exploit a flaw in the speculative execution of Load and Store instructions to read privileged memory.
Note: the vulnerability is referred to as "Spectre variant 4".
Install update from vendor's website.
Vulnerable software versionskernel-rt (Red Hat package): 3.10.0-229.1.2.rt56.141.2.el7_1 - 3.10.0-862.3.3.rt56.809.el7
Red Hat Enterprise Linux for Real Time: 7
Red Hat Enterprise Linux for Real Time for NFV: 7
:
http://access.redhat.com/errata/RHSA-2018:2003
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?