Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2021-26401 CVE-2017-5715 |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software Subscribe |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) Operating systems & Components / Operating system Red Hat Enterprise Linux Server - Extended Life Cycle Support Operating systems & Components / Operating system kernel (Red Hat package) Operating systems & Components / Operating system package or component |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU61566
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2021-26401
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application within LFENCE/JMP. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems): 6.0
Red Hat Enterprise Linux Server - Extended Life Cycle Support: 6.0
kernel (Red Hat package): before 2.6.32-754.49.1.el6
http://access.redhat.com/errata/RHSA-2023:0187
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU9883
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2017-5715
CWE-ID:
CWE-200 - Information exposure
Exploit availability: Yes
DescriptionThe vulnerability allows a local attacker to obtain potentially sensitive information.
The vulnerability exists in Intel CPU hardware due to improper implementation of the speculative execution of instructions. A local attacker can utilize branch target injection, execute arbitrary code, perform a side-channel attack and read sensitive memory information.
MitigationInstall updates from vendor's website.
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems): 6.0
Red Hat Enterprise Linux Server - Extended Life Cycle Support: 6.0
kernel (Red Hat package): before 2.6.32-754.49.1.el6
http://access.redhat.com/errata/RHSA-2023:0187
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?