SB2019111233 - Red Hat Enterprise Linux 7.7 update for microcode_ctl



SB2019111233 - Red Hat Enterprise Linux 7.7 update for microcode_ctl

Published: November 12, 2019 Updated: December 10, 2020

Security Bulletin ID SB2019111233
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2019-0117)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics. A local user can gain access to sensitive information.

The following processor families are affected:

  • 6th Generation Intel Core processors
  • 7th Generation Intel Core processors
  • 8th Generation Intel Core processors
  • 9th Generation Intel Core processors
  • Intel Xeon Processor E3 v5 Family
  • Intel Xeon Processor E3 v6 Family
  • Intel Xeon Processor E- 2100 Family
  • Intel Xeon Processor E-2200 Family

2) Resource management error (CVE-ID: CVE-2019-11135)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the TSX Asynchronous Abort (TAA) in Intel CPUs. The TAA condition, on some microprocessors utilizing speculative execution, may allow an authenticated user to potentially enable information disclosure via a side channel.

3) Resource management error (CVE-ID: CVE-2019-11139)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors. A local user can perform a denial of service attack.

The following Intel Xeon Scalable Processors are affected:

  • Intel Xeon Platinum Processors: 8153, 8156, 8158, 8160, 8160F, 8160M, 8160T, 8164, 8168, 8170, 8170M, 8176, 8176F, 8176M, 8180, 8180M
  • Intel Xeon Gold Processors: 5115, 5118, 5119T, 5120, 5120T, 5122, 6126, 6126F, 6126T, 6128, 6130, 6130F, 6130T, 6132, 6134, 6134M, 6136, 6138, 6138F, 6138T, 6140, 6140M, 6142, 6142F, 6142M, 6144, 6146, 6148, 6148F, 6150, 6152, 6154
  • Intel Xeon Silver Processors: 4108, 4109T, 4110, 4112, 4114, 4114T, 4116, 4116T
  • Intel Xeon Bronze Processors: 3104, 3106

Remediation

Install update from vendor's website.