VID |
14246 |
Severity |
40 |
Port |
22 |
Protocol |
TCP |
Class |
LSC |
Detailed Description |
The remote system does not apply RHSA-2019:2473 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities:
- page cache side channel attacks (CVE-2019-5489)
- Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805)
- Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)
- Spectre SWAPGS gadget vulnerability (CVE-2019-1125)
Note: This check solely relied on the kernel RPM version of the remote system to assess this vulnerability, so this might be a false positive.
* References: https://access.redhat.com/articles/4329821 https://access.redhat.com/errata/RHSA-2019:2473 https://access.redhat.com/security/cve/cve-2017-17805 https://access.redhat.com/security/cve/cve-2018-17972 https://access.redhat.com/security/cve/cve-2019-1125 https://access.redhat.com/security/cve/cve-2019-5489
* Platforms Affected: Red Hat Enterprise Linux Server (v. 6) |
Recommendation |
Update the affected packages. Launch the graphical update tool through Applications -> System Tools -> Software Update
For a command line interface, use the following command to update the operating system: # yum update |
Related URL |
CVE-2017-17805,CVE-2018-17972,CVE-2019-1125,CVE-2019-5489 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|