kernel-2.6.32-696.18.7.el6
エラータID: AXSA:2018-2508:01
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.
In this update mitigations for x86-64 architecture are provided.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)
Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.
Asianux would like to thank Google Project Zero for reporting these issues.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and
branch prediction may allow unauthorized disclosure of information to
an attacker with local user access via a side-channel analysis.
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis of the data cache.
Update packages.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
N/A
SRPMS
- kernel-2.6.32-696.18.7.el6.src.rpm
MD5: 3c25f8417e3219d8b87647b8b1b53a96
SHA-256: b2e34edfe5642bea7d7f1041e9eae2b193b34cbc42b020c02dfa1fb92f362a5e
Size: 128.62 MB
Asianux Server 4 for x86
- kernel-2.6.32-696.18.7.el6.i686.rpm
MD5: bf09c2b68e49ede61931297e91b4e61e
SHA-256: 8bf6a8aff85bca5f020856307cb9939b22c54479807cc2a93b4ece1a68f2d719
Size: 29.74 MB - kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
MD5: 4fe704c6b6bfb77e63784a6b6edc8e3e
SHA-256: f90569f4c4d9c2eb169f1af9b1f6072f7806f87be1405986f6af37caaf3bec2f
Size: 3.76 MB - kernel-debug-2.6.32-696.18.7.el6.i686.rpm
MD5: 3ecf256dd7cd7a94fbadbd6d5d81678b
SHA-256: ac58a91483a76a58c7174840aa48d5f6b521f4ebeadd7d5b9f1c9907bf254ddc
Size: 30.53 MB - kernel-debug-devel-2.6.32-696.18.7.el6.i686.rpm
MD5: 9c0485a5b0e600ff0c376b33b62a9715
SHA-256: 2009f2b260836c7438d8535d72bb06a32776eb8bdeb281eb6e65fb5c4f704c10
Size: 10.73 MB - kernel-devel-2.6.32-696.18.7.el6.i686.rpm
MD5: c04a2d1be92527962ec4aa30e5a9fb03
SHA-256: cb9d56d562790cf75b140fb35e0d23934229a8c8f4e5bfe08282f1ac1a7ff812
Size: 10.68 MB - kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
MD5: 1e250878bd82b0299cef184f2d928b55
SHA-256: f7cf7ca822be9447184be841bd300f49b2e77a476a6d8fb9dec5c6f61a3fd4fa
Size: 12.33 MB - kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
MD5: 1f7fa592075d9e03a3841e25ab047537
SHA-256: 89962a4dd5228fe81ee0b17ff98bc79df301e373f1760b0e1052a4ae73cd5676
Size: 28.83 MB - kernel-headers-2.6.32-696.18.7.el6.i686.rpm
MD5: 0d9009be0ae69e7b172bd3e82018d0d0
SHA-256: 156f7317aa67a702ffa4339b514acf1ddf2e3385ee3ec52c81b273ca92f530be
Size: 4.48 MB - perf-2.6.32-696.18.7.el6.i686.rpm
MD5: c418262b4d5b21bcc21e7f7ae6333d23
SHA-256: 3b41631d0558ebd74dd78fcb915cce9a1e3e43aee5898db9cfbf7e854fed1af8
Size: 4.71 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-696.18.7.el6.x86_64.rpm
MD5: 13df2ffb56144205c468e0bed8e0e3ca
SHA-256: ea6f4bf72fd116a6a193e9d3799c3133e68b3d5bdd36312f62a1014a21769e73
Size: 32.05 MB - kernel-abi-whitelists-2.6.32-696.18.7.el6.noarch.rpm
MD5: ef6bbb06ed4a1ba62b82417c53caa6cf
SHA-256: 74ac6d634bfa5e6cf46ab36669f3f4b08eeb4c48b8660f2bc4a1cd8ee62d2c1a
Size: 3.76 MB - kernel-debug-2.6.32-696.18.7.el6.x86_64.rpm
MD5: 380ad002d54842db9f0bb61bbe4fda98
SHA-256: 1fb002c7082f3006d9298be92692390dc4f3be6d910ab6f96df6cfc5aeb17208
Size: 32.93 MB - kernel-debug-devel-2.6.32-696.18.7.el6.x86_64.rpm
MD5: 6adc0f62529e58e4dc1e58a398fa95d9
SHA-256: a77b7f72b7701ddeddc5e35dae303b16bc6270a5cbc63530c99ab6355b6af696
Size: 10.78 MB - kernel-devel-2.6.32-696.18.7.el6.x86_64.rpm
MD5: 49dfb127ee01ee1d72ffb74336143ae3
SHA-256: 1caac1f62daff792c4ae74970b7dc0ddd5ddd16ee8c85f445f98853d2abbbe97
Size: 10.73 MB - kernel-doc-2.6.32-696.18.7.el6.noarch.rpm
MD5: ed80c975d81f1e6fc875ad56ccf71d16
SHA-256: 1e5fa3780b288ce35a9c4a3c19a535964716e7065371304070026ab43be6606f
Size: 12.33 MB - kernel-firmware-2.6.32-696.18.7.el6.noarch.rpm
MD5: 7152a3c61154db09c5b49eb643f5c40e
SHA-256: 5a49849efdc181fb1456832cb9c23fcb3f65c5d4de65fb94ef7da45585c66a43
Size: 28.83 MB - kernel-headers-2.6.32-696.18.7.el6.x86_64.rpm
MD5: df98ff6e60f6e42c8ec1ebed3fe9f7c1
SHA-256: 9527c37692f5f2da6c5478e87f7ab7f348da86d9dcf337b8cf0654178b9e1ca5
Size: 4.48 MB - perf-2.6.32-696.18.7.el6.x86_64.rpm
MD5: eb49e0e35cc9eaecfb59a03fbab8c8a9
SHA-256: 87f56e24f076b177565f6d05846230838b14840aeb172d50561defcdcba726a2
Size: 4.68 MB