logo
DATABASE RESOURCES PRICING ABOUT US

Multiple Intel Products CVE-2019-0154 Denial of Service Vulnerability

Description

### Description Multiple Intel Products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service conditions. ### Technologies Affected * Intel 6th generation Core processors * Intel 7th generation Core processors * Intel 8th generation Core processors * Intel 9th generation Core processors * Intel Atom Processor A Series * Intel Atom Processor E3900 Series * Intel Celeron Processor G3900 Series * Intel Celeron Processor G4900 Series * Intel Celeron Processor J Series * Intel Celeron Processor N Series * Intel Graphics Driver * Intel Pentium Gold Processor Series * Intel Pentium Processor J Series * Intel Pentium Processor N Series * Intel Pentium Silver Processor Series * Intel Xeon Processor E-2100 * Intel Xeon Processor E-2200 * Intel Xeon® E3- 1500M v6 * Intel Xeon® E3-1500M v5 * Intel i915 Graphics * Redhat Enterprise Linux Desktop 6 * Redhat Enterprise Linux EUS Compute Node 7.7 * Redhat Enterprise Linux Server - AUS 7.2 * Redhat Enterprise Linux Server - AUS 7.7 * Redhat Enterprise Linux Server - Extended Update Support 7.7 * Redhat Enterprise Linux Server - TUS 7.2 * Redhat Enterprise Linux Server - TUS 7.7 * Redhat Enterprise Linux Server - Update Services for SAP Solutions 7.2 * Redhat Enterprise Linux Server - Update Services for SAP Solutions 7.7 * Redhat Enterprise Linux Server 6 * Redhat Enterprise Linux Workstation 6 * Redhat Enterprise Linux for IBM z Systems 6 * Redhat Enterprise Linux for Power, big endian 6 * Redhat Enterprise Linux for Real Time 7 * Redhat Enterprise Linux for Real Time 8 * Redhat Enterprise Linux for Real Time for NFV 7 * Redhat Enterprise Linux for Real Time for NFV 8 * Redhat MRG Realtime 2 * Ubuntu Ubuntu Linux 18.04 LTS * Ubuntu Ubuntu Linux 19.04 ### Recommendations **Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** Allow only trusted and accountable individuals to have local interactive access to the vulnerable computer. **Run all software as a nonprivileged user with minimal access rights.** To limit the impact of latent vulnerabilities, configure applications to run as a nonadministrative user with minimal access rights. Updates are available. Please see the references or vendor advisory for more information.


Affected Software


CPE Name Name Version
redhat enterprise linux desktop 6
redhat enterprise linux server 6
redhat enterprise linux server - aus 7.2
redhat enterprise linux for real time for nfv 8
redhat enterprise linux for real time for nfv 7
redhat enterprise linux server - extended update support 7.7
redhat mrg realtime 2
redhat enterprise linux for real time 7
redhat enterprise linux workstation 6
redhat enterprise linux server - tus 7.2
redhat enterprise linux server - tus 7.7
redhat enterprise linux server - aus 7.7
intel 6th generation Core processors
redhat enterprise linux server - update services for sap solutions 7.7
redhat enterprise linux for real time 8
ubuntu ubuntu linux 19.04
intel 7th generation Core processors
redhat enterprise linux eus compute node 7.7
redhat enterprise linux server - update services for sap solutions 7.2
intel 9th generation Core processors
intel 8th generation Core processors
ubuntu ubuntu linux 18.04 LTS
redhat enterprise linux for ibm z systems 6

Related