kernel-3.10.0-862.2.3.el7

エラータID: AXSA:2018-3108:04

Release date: 
Monday, May 21, 2018 - 11:02
Subject: 
kernel-3.10.0-862.2.3.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087)

* Kernel: error in exception handling leads to DoS (CVE-2018-8897)

* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939)

* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068)

* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199)

* kernel: guest kernel crash during core dump on POWER9 host (CVE-2018-1091)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Asianux would like to thank Andy Lutomirski for reporting CVE-2018-1087 and CVE-2018-1000199 and Nick Peterson (Everdox Tech LLC) and Andy Lutomirski for reporting CVE-2018-8897.

Bug Fix(es):

These updated kernel packages include also numerous bug fixes. Space precludes documenting all of these bug fixes in this advisory. See the bug fix descriptions in the related Knowledge Article: https://access.redhat.com/articles/3431641

CVE-2017-16939
The XFRM dump policy implementation in net/xfrm/xfrm_user.c in the Linux kernel before 4.13.11 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted SO_RCVBUF setsockopt system call in conjunction with XFRM_MSG_GETPOLICY Netlink messages.
CVE-2018-1068
A flaw was found in the Linux 4.x kernel's implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.
CVE-2018-1087
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-1091
In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.
CVE-2018-8897
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.
CVE-2018-1000199
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be provided.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-862.2.3.el7.src.rpm
    MD5: d5ea358f04158569f94c2fad377b3868
    SHA-256: e975f48068d3e8cfe56e744b94d693a905383d7b65532e8849787021779c0baa
    Size: 93.68 MB

Asianux Server 7 for x86_64
  1. kernel-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: c215c2078ac44e7e046d251454ef4f0f
    SHA-256: 0ae35dbb803823ca0654f3486ab5265ceb88ce4b48392b5292c535dea7756a19
    Size: 46.02 MB
  2. kernel-abi-whitelists-3.10.0-862.2.3.el7.noarch.rpm
    MD5: f76b7e6adf58b79771cdaaf6ecda9b34
    SHA-256: eabf5d194d66ecf04816ee52f51349d8b79a15b3a5418359e6f3974188ab7b29
    Size: 6.15 MB
  3. kernel-debug-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 0715f5f9282f1b59eb496dffcacb4654
    SHA-256: c67747bbdcc4929907ebbc706f0f205ba830c09eaa319312dda0d3f9e4c01456
    Size: 48.03 MB
  4. kernel-debug-devel-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 2302487d9de737b3a296df3f6ee86447
    SHA-256: 3ae9f5879757426508d3058c6c9a06fdf2d42d35aca4e9f7c42fa41b9bc61e53
    Size: 15.75 MB
  5. kernel-devel-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 0bfad2b7e05ef80d15d2218736628fae
    SHA-256: 81c55fae2d63722bab369a0257ade1cf91e8c8bde69b9ad2b68179c2b7e492a4
    Size: 15.68 MB
  6. kernel-doc-3.10.0-862.2.3.el7.noarch.rpm
    MD5: 56a20e05c649698d331bc96b185b6e32
    SHA-256: 93b6c1361b912a187954854ceef9d5cde6d171c5ae9738ff7c6ec164152de08a
    Size: 17.44 MB
  7. kernel-headers-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 571d45382a42b371143d32d46e0547a7
    SHA-256: 950c39fd4883b1d0f2e385049dd5ac1ef234138f0b17a7d36af957b26064369d
    Size: 7.10 MB
  8. kernel-tools-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 7fdafd7926bd57745a83489287c6fcd1
    SHA-256: 897c835e446f77e38e04b839e34ca97e1245fa138d45dd5ab3f335b12dcb959c
    Size: 6.24 MB
  9. kernel-tools-libs-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 1ee6c60f8dad72b07bfc6421e9daae9b
    SHA-256: f55c922158f93148f16c042a4c213f0f05fdcb08a2533851e2a8957460863980
    Size: 6.15 MB
  10. perf-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: e33fc6d45d078ec5610fe9b78218e609
    SHA-256: 06188856600a4da234ce3ba6b80b7b4b3e6762fc536cb90faad6526e6d8831c6
    Size: 7.59 MB
  11. python-perf-3.10.0-862.2.3.el7.x86_64.rpm
    MD5: 87fc939cf2fdb11b98c492e1e88c606d
    SHA-256: 30f649e3e1f2f50d6cb5fd40066a5e7f008c3bd3ae4e6868b4736e0ee3a57110
    Size: 6.24 MB