Korean
<< Back
VID 14246
Severity 40
Port 22
Protocol TCP
Class LSC
Detailed Description The remote system does not apply RHSA-2019:2473 which is kernel security update. The system which does not apply the update is affected by the following vulnerabilities:

- page cache side channel attacks (CVE-2019-5489)

- Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial-of-service (CVE-2017-17805)

- Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972)

- Spectre SWAPGS gadget vulnerability (CVE-2019-1125)

Note: This check solely relied on the kernel RPM version of the remote system to assess this vulnerability, so this might be a false positive.

* References:
https://access.redhat.com/articles/4329821
https://access.redhat.com/errata/RHSA-2019:2473
https://access.redhat.com/security/cve/cve-2017-17805
https://access.redhat.com/security/cve/cve-2018-17972
https://access.redhat.com/security/cve/cve-2019-1125
https://access.redhat.com/security/cve/cve-2019-5489

* Platforms Affected:
Red Hat Enterprise Linux Server (v. 6)
Recommendation Update the affected packages.
Launch the graphical update tool through
Applications -> System Tools -> Software Update

For a command line interface, use the following command to update the operating system:
# yum update
Related URL CVE-2017-17805,CVE-2018-17972,CVE-2019-1125,CVE-2019-5489 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)