5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.975 High
EPSS
Percentile
100.0%
CentOS Errata and Security Advisory CESA-2018:0094
The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
This update supersedes microcode provided by Red Hat with the CVE-2017-5715 (“Spectre”) CPU branch injection vulnerability mitigation. (Historically, Red Hat has provided updated microcode, developed by our microprocessor partners, as a customer convenience.) Further testing has uncovered problems with the microcode provided along with the “Spectre” mitigation that could lead to system instabilities. As a result, Red Hat is providing an microcode update that reverts to the last known good microcode version dated before 03 January 2018. Red Hat strongly recommends that customers contact their hardware provider for the latest microcode updates.
IMPORTANT: Customers using Intel Skylake-, Broadwell-, and Haswell-based platforms must obtain and install updated microcode from their hardware vendor immediately. The “Spectre” mitigation requires both an updated kernel from Red Hat and updated microcode from your hardware vendor.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2018-January/084873.html
Affected packages:
iwl100-firmware
iwl1000-firmware
iwl105-firmware
iwl135-firmware
iwl2000-firmware
iwl2030-firmware
iwl3160-firmware
iwl3945-firmware
iwl4965-firmware
iwl5000-firmware
iwl5150-firmware
iwl6000-firmware
iwl6000g2a-firmware
iwl6000g2b-firmware
iwl6050-firmware
iwl7260-firmware
iwl7265-firmware
linux-firmware
Upstream details at:
https://access.redhat.com/errata/RHSA-2018:0094
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | noarch | iwl1000-firmware | < 39.31.5.1-58.el7_4 | iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl100-firmware | < 39.31.5.1-58.el7_4 | iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl105-firmware | < 18.168.6.1-58.el7_4 | iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl135-firmware | < 18.168.6.1-58.el7_4 | iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl2000-firmware | < 18.168.6.1-58.el7_4 | iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl2030-firmware | < 18.168.6.1-58.el7_4 | iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl3160-firmware | < 22.0.7.0-58.el7_4 | iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl3945-firmware | < 15.32.2.9-58.el7_4 | iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl4965-firmware | < 228.61.2.24-58.el7_4 | iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm |
CentOS | 7 | noarch | iwl5000-firmware | < 8.83.5.1_1-58.el7_4 | iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm |
5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
0.975 High
EPSS
Percentile
100.0%