kernel-2.6.32-696.20.1.el6

エラータID: AXSA:2018-2579:02

Release date: 
Saturday, February 10, 2018 - 09:23
Subject: 
kernel-2.6.32-696.20.1.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542, Moderate)

* The IPv6 fragmentation implementation in the Linux kernel does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. (CVE-2017-9074, Moderate)

* A use-after-free flaw was found in the Netlink functionality of the Linux kernel networking subsystem. Due to the insufficient cleanup in the mq_notify function, a local attacker could potentially use this flaw to escalate their privileges on the system. (CVE-2017-11176, Moderate)

Bug Fix(es):

* Previously, the default timeout and retry settings in the VMBus driver were insufficient in some cases, for example when a Hyper-V host was under a significant load. Consequently, in Windows Server 2016, Hyper-V Server 2016, and Windows Azure Platform, when running a Asianux Server Guest on the Hyper-V hypervisor, the guest failed to boot or booted with certain Hyper-V devices missing. This update alters the timeout and retry settings in VMBus, and Asianux Server guests now boot as expected under the described conditions. (BZ#1506145)

* Previously, an incorrect external declaration in the be2iscsi driver caused a kernel panic when using the systool utility. With this update, the external declaration in be2iscsi has been fixed, and the kernel no longer panics when using systool. (BZ#1507512)

* Under high usage of the NFSD file system and memory pressure, if many tasks in the Linux kernel attempted to obtain the global spinlock to clean the Duplicate Reply Cache (DRC), these tasks stayed in an active wait in the nfsd_reply_cache_shrink() function for up to 99% of time. Consequently, a high load average occurred. This update fixes the bug by separating the DRC in several parts, each with an independent spinlock. As a result, the load and CPU utilization is no longer excessive under the described circumstances. (BZ#1509876)

* When attempting to attach multiple SCSI devices simultaneously, Asianux Server 4.9 on IBM z Systems sometimes became unresponsive. This update fixes the zfcp device driver, and attaching multiple SCSI devices simultaneously now works as expected in the described scenario. (BZ#1512425)

* On IBM z Systems, the tiqdio_call_inq_handlers() function in the Linux kernel incorrectly cleared the device state change indicator (DSCI) for the af_iucv devices using the HiperSockets transport with multiple input queues. Consequently, queue stalls on such devices occasionally occurred. With this update, tiqdio_call_inq_handlers() has been fixed to clear the DSCI only once, prior to scanning the queues. As a result, queue stalls for af_iucv devices using the HiperSockets transport no longer occur under the described circumstances. (BZ#1513314)

* Previously, small data chunks caused the Stream Control Transmission Protocol (SCTP) to account the receiver_window (rwnd) values incorrectly when recovering from a "zero-window situation". As a consequence, window updates were not sent to the peer, and an artificial growth of rwnd could lead to packet drops. This update properly accounts such small data chunks and ignores the rwnd pressure values when reopening a window. As a result, window updates are now sent, and the announced rwnd reflects better the real state of the receive buffer. (BZ#1514443)

CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set
the sock pointer to NULL upon entry into the retry logic. During a
user-space close of a Netlink socket, it allows attackers to cause a
denial of service (use-after-free) or possibly have unspecified other
impact.
CVE-2017-7542
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux
kernel through 4.12.3 allows local users to cause a denial of service
(integer overflow and infinite loop) by leveraging the ability to open
a raw socket.
CVE-2017-9074
The IPv6 fragmentation implementation in the Linux kernel through
4.11.1 does not consider that the nexthdr field may be associated with
an invalid option, which allows local users to cause a denial of
service (out-of-bounds read and BUG) or possibly have unspecified other
impact via crafted socket and send system calls.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-696.20.1.el6.src.rpm
    MD5: 1c54bbfb43543788664c6542eacaffdd
    SHA-256: 3be0c02f4edb0a8a24d87cca97c0cd7fa31f892cc2df76a454e1827522f54352
    Size: 128.63 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-696.20.1.el6.i686.rpm
    MD5: e946279500784dc4a1b943bbbb7c6c38
    SHA-256: b43e3b0e0de3ed111ff38b92d80e1dc77c64949803e98da7450c79d6d9079e5f
    Size: 29.74 MB
  2. kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm
    MD5: fd5c9fa568303121df49ea8361c81fd0
    SHA-256: e89e40be99895d897d24d2baa4647d3b6f620df02b94c4b127b7ce5503c99893
    Size: 3.76 MB
  3. kernel-debug-2.6.32-696.20.1.el6.i686.rpm
    MD5: fec50dcd7fad76a318dfb237e73947b4
    SHA-256: 20ed7adc7dc299648e5affd05ee0352328c6ef25f8b4d470d9c3900da2e0ddc4
    Size: 30.53 MB
  4. kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm
    MD5: 82fcba81d032d9a60dced97bb5a5338c
    SHA-256: 94ecbcc3e7f0e36f4343a328cb508a4f7b88cbe1f408697a54b829cf69e86f9f
    Size: 10.73 MB
  5. kernel-devel-2.6.32-696.20.1.el6.i686.rpm
    MD5: 0640dd712159a6c7b670fff1ff9ec4ed
    SHA-256: 7d7d4dbadab390f88ec95e9ce278509352d5f3806e27b653cf976de3e33602e1
    Size: 10.69 MB
  6. kernel-doc-2.6.32-696.20.1.el6.noarch.rpm
    MD5: 9d948b7ab15555faa8b79a617116cf55
    SHA-256: 3508d408ce4a1df4e8f876d276fe60a417e21aa22dd206d3fdc290a5d5726499
    Size: 12.34 MB
  7. kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm
    MD5: e12599618c575a2ae789447ffb452885
    SHA-256: 878d5a0c91a401363fe0f4fded6d839fad12acc725f2d14b43e19dd2fc982ee1
    Size: 28.83 MB
  8. kernel-headers-2.6.32-696.20.1.el6.i686.rpm
    MD5: a26eb9c33f93ee5c2a305a469b88efd3
    SHA-256: 0166a768043cca8365f0c46e8d12e0ccc583ca23ee40331268822df8a3127af6
    Size: 4.48 MB
  9. perf-2.6.32-696.20.1.el6.i686.rpm
    MD5: 60d4006911e03c27211515f3920722e5
    SHA-256: 47e8ae216841f7ecbd95db1ea7c10fb3e2017c63e50831bc315e0aa06277c8c8
    Size: 4.71 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: 93366fc07cf173fce864f2ec974e4268
    SHA-256: 7ffba002c41aa98e05d1077b9900ad68a8d6cc7eb971f551a45dd97110151677
    Size: 32.05 MB
  2. kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm
    MD5: 6ce4cfe023c0fec290ed9c88443f44be
    SHA-256: 8456f9353fcd674913bfeca8fc2c8d4c002e400e501ab29de2dba2a8699b0346
    Size: 3.76 MB
  3. kernel-debug-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: bcd3c3605cd20b587c60f9bcc01cd5f2
    SHA-256: 11fee69a901b1807f0ca7fe94203dac5b1e15cc598d062a88bccf13396c12703
    Size: 32.93 MB
  4. kernel-debug-devel-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: 59b3c8fcfe0286abfe33da011d19ba47
    SHA-256: 69d77037db2c302e25535323f1bce528fa231022ea9530f1644b63042d454996
    Size: 10.78 MB
  5. kernel-devel-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: 5cb8406158ae8ac44cb4af8198568396
    SHA-256: 7ecc9ebbab21c667890a8bd53b8670974adadd59c52d86a15797f85cd6804b0d
    Size: 10.74 MB
  6. kernel-doc-2.6.32-696.20.1.el6.noarch.rpm
    MD5: 9b0cc284eb520b2d950b95b5c150ba2e
    SHA-256: 2756033728c7d734c350345335845d7ac92863822bc7350f22e0cfdd8ab32ad4
    Size: 12.34 MB
  7. kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm
    MD5: 5310f0238af7b444002cb25410ba790c
    SHA-256: 47555b5cdac0169811bff1f21291c9958877bcedaed4639fd6f9010826f040ce
    Size: 28.83 MB
  8. kernel-headers-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: e45960b9ba084bf8e08f3c234e57b52f
    SHA-256: d7c50d10bcd8201fc8fa840cc449e1202c8954860df26bb1b138980b1ad28277
    Size: 4.48 MB
  9. perf-2.6.32-696.20.1.el6.x86_64.rpm
    MD5: 10fbd615abae712a4fec669777eccdef
    SHA-256: a56b466db842fb96fffc367dbdca8edab9ed5016aa22f99ecaad3c7e7be9e69b
    Size: 4.68 MB