First published: Thu Jun 27 2019(Updated: )
A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel.
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.18.2.el6 | 0:2.6.32-754.18.2.el6 |
redhat/kernel | <0:2.6.32-431.96.1.el6 | 0:2.6.32-431.96.1.el6 |
redhat/kernel | <0:2.6.32-504.80.2.el6 | 0:2.6.32-504.80.2.el6 |
redhat/kernel-rt | <0:3.10.0-1062.1.1.rt56.1024.el7 | 0:3.10.0-1062.1.1.rt56.1024.el7 |
redhat/kernel | <0:3.10.0-1062.1.1.el7 | 0:3.10.0-1062.1.1.el7 |
redhat/kernel | <0:3.10.0-327.82.1.el7 | 0:3.10.0-327.82.1.el7 |
redhat/kernel | <0:3.10.0-514.69.1.el7 | 0:3.10.0-514.69.1.el7 |
redhat/kernel | <0:3.10.0-693.58.1.el7 | 0:3.10.0-693.58.1.el7 |
redhat/kernel | <0:3.10.0-862.43.1.el7 | 0:3.10.0-862.43.1.el7 |
redhat/kernel | <0:3.10.0-957.38.1.el7 | 0:3.10.0-957.38.1.el7 |
redhat/kernel-rt | <0:4.18.0-80.7.2.rt9.154.el8_0 | 0:4.18.0-80.7.2.rt9.154.el8_0 |
redhat/kernel | <0:4.18.0-80.7.2.el8_0 | 0:4.18.0-80.7.2.el8_0 |
redhat/kernel-rt | <1:3.10.0-693.58.1.rt56.652.el6 | 1:3.10.0-693.58.1.rt56.652.el6 |
redhat/redhat-release-virtualization-host | <0:4.2-15.1.el7 | 0:4.2-15.1.el7 |
redhat/redhat-virtualization-host | <0:4.2-20191022.0.el7_6 | 0:4.2-20191022.0.el7_6 |
redhat/imgbased | <0:1.1.10-0.1.el7e | 0:1.1.10-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.6-0.20190820.0.el7e | 0:4.3.6-0.20190820.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.6-2.el7e | 0:4.3.6-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.6-20190924.0.el7_7 | 0:4.3.6-20190924.0.el7_7 |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2019 | ||
redhat virtualization host | =4.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =7.7 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/articles/4329821
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-1125 is rated as medium, indicating a moderate risk of information disclosure through a Spectre-like side channel.
To mitigate CVE-2019-1125, users should upgrade to the recommended kernel versions provided by Red Hat, such as 0:2.6.32-754.18.2.el6 or any version specified in security patches.
CVE-2019-1125 allows an attacker with local access to exploit a Spectre gadget to leak sensitive information through side-channel attacks.
CVE-2019-1125 affects multiple versions of the Linux kernel, specifically those running on Red Hat Enterprise Linux and related distributions.
While the best solution is to update the kernel, users may temporarily minimize exposure by restricting local access to systems until updates can be applied.