kernel-2.6.32-696.18.7.el6

エラータID: AXSA:2018-2508:01

Release date: 
Wednesday, January 10, 2018 - 10:19
Subject: 
kernel-2.6.32-696.18.7.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.

Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.

In this update mitigations for x86-64 architecture are provided.

Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)

Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)

Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)

Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.

Asianux would like to thank Google Project Zero for reporting these issues.

CVE-2017-5715
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and
branch prediction may allow unauthorized disclosure of information to
an attacker with local user access via a side-channel analysis.
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis of the data cache.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-696.18.7.el6.src.rpm
    MD5: 3c25f8417e3219d8b87647b8b1b53a96
    SHA-256: b2e34edfe5642bea7d7f1041e9eae2b193b34cbc42b020c02dfa1fb92f362a5e
    Size: 128.62 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-696.18.7.el6.i686.rpm
    MD5: bf09c2b68e49ede61931297e91b4e61e
    SHA-256: 8bf6a8aff85bca5f020856307cb9939b22c54479807cc2a93b4ece1a68f2d719
    Size: 29.74 MB
  2. kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
    MD5: 4fe704c6b6bfb77e63784a6b6edc8e3e
    SHA-256: f90569f4c4d9c2eb169f1af9b1f6072f7806f87be1405986f6af37caaf3bec2f
    Size: 3.76 MB
  3. kernel-debug-2.6.32-696.18.7.el6.i686.rpm
    MD5: 3ecf256dd7cd7a94fbadbd6d5d81678b
    SHA-256: ac58a91483a76a58c7174840aa48d5f6b521f4ebeadd7d5b9f1c9907bf254ddc
    Size: 30.53 MB
  4. kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
    MD5: 9c0485a5b0e600ff0c376b33b62a9715
    SHA-256: 2009f2b260836c7438d8535d72bb06a32776eb8bdeb281eb6e65fb5c4f704c10
    Size: 10.73 MB
  5. kernel-devel-2.6.32-696.18.7.el6.i686.rpm
    MD5: c04a2d1be92527962ec4aa30e5a9fb03
    SHA-256: cb9d56d562790cf75b140fb35e0d23934229a8c8f4e5bfe08282f1ac1a7ff812
    Size: 10.68 MB
  6. kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
    MD5: 1e250878bd82b0299cef184f2d928b55
    SHA-256: f7cf7ca822be9447184be841bd300f49b2e77a476a6d8fb9dec5c6f61a3fd4fa
    Size: 12.33 MB
  7. kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
    MD5: 1f7fa592075d9e03a3841e25ab047537
    SHA-256: 89962a4dd5228fe81ee0b17ff98bc79df301e373f1760b0e1052a4ae73cd5676
    Size: 28.83 MB
  8. kernel-headers-2.6.32-696.18.7.el6.i686.rpm
    MD5: 0d9009be0ae69e7b172bd3e82018d0d0
    SHA-256: 156f7317aa67a702ffa4339b514acf1ddf2e3385ee3ec52c81b273ca92f530be
    Size: 4.48 MB
  9. perf-2.6.32-696.18.7.el6.i686.rpm
    MD5: c418262b4d5b21bcc21e7f7ae6333d23
    SHA-256: 3b41631d0558ebd74dd78fcb915cce9a1e3e43aee5898db9cfbf7e854fed1af8
    Size: 4.71 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: 13df2ffb56144205c468e0bed8e0e3ca
    SHA-256: ea6f4bf72fd116a6a193e9d3799c3133e68b3d5bdd36312f62a1014a21769e73
    Size: 32.05 MB
  2. kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
    MD5: ef6bbb06ed4a1ba62b82417c53caa6cf
    SHA-256: 74ac6d634bfa5e6cf46ab36669f3f4b08eeb4c48b8660f2bc4a1cd8ee62d2c1a
    Size: 3.76 MB
  3. kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: 380ad002d54842db9f0bb61bbe4fda98
    SHA-256: 1fb002c7082f3006d9298be92692390dc4f3be6d910ab6f96df6cfc5aeb17208
    Size: 32.93 MB
  4. kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: 6adc0f62529e58e4dc1e58a398fa95d9
    SHA-256: a77b7f72b7701ddeddc5e35dae303b16bc6270a5cbc63530c99ab6355b6af696
    Size: 10.78 MB
  5. kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: 49dfb127ee01ee1d72ffb74336143ae3
    SHA-256: 1caac1f62daff792c4ae74970b7dc0ddd5ddd16ee8c85f445f98853d2abbbe97
    Size: 10.73 MB
  6. kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
    MD5: ed80c975d81f1e6fc875ad56ccf71d16
    SHA-256: 1e5fa3780b288ce35a9c4a3c19a535964716e7065371304070026ab43be6606f
    Size: 12.33 MB
  7. kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
    MD5: 7152a3c61154db09c5b49eb643f5c40e
    SHA-256: 5a49849efdc181fb1456832cb9c23fcb3f65c5d4de65fb94ef7da45585c66a43
    Size: 28.83 MB
  8. kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: df98ff6e60f6e42c8ec1ebed3fe9f7c1
    SHA-256: 9527c37692f5f2da6c5478e87f7ab7f348da86d9dcf337b8cf0654178b9e1ca5
    Size: 4.48 MB
  9. perf-2.6.32-696.18.7.el6.x86_64.rpm
    MD5: eb49e0e35cc9eaecfb59a03fbab8c8a9
    SHA-256: 87f56e24f076b177565f6d05846230838b14840aeb172d50561defcdcba726a2
    Size: 4.68 MB