kernel-2.6.32-696.20.1.el6
エラータID: AXSA:2018-2579:02
リリース日:
2018/02/10 Saturday - 09:23
題名:
kernel-2.6.32-696.20.1.el6
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- mq_notify 関数は、リトライロジックへの登録の際に sock ポインタを NULL
に設定しないため、ユーザ空間の Netlink ソケットのクローズ中に、攻撃者
によりサービス運用妨害 (解放済みメモリの使用 (use-after-free)) 状態に
されるなど、不特定の影響を受ける脆弱性が存在します。 (CVE-2017-11176)
- net/ipv6/output_core.c の ip6_find_1stfragopt 関数には、ローカルユーザ
により、raw ソケットのオープンの機能を利用されることで、サービス運用妨
害 (整数オーバーフローおよび無限ループ) 状態にされる脆弱性が存在します。
(CVE-2017-7542)
- IPv6 断片化 (fragmentation) の実装には、nexthdr フィールドが不正なオプ
ションに関連付けられている可能性を考慮しないため、ローカルユーザにより、
サービス運用妨害 (境界外読み取りおよびバグ) 状態にされるなど、不特定の
影響を受ける脆弱性が存在します。(CVE-2017-9074)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2017-11176
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
CVE-2017-7542
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
CVE-2017-9074
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-2.6.32-696.20.1.el6.src.rpm
MD5: 1c54bbfb43543788664c6542eacaffdd
SHA-256: 3be0c02f4edb0a8a24d87cca97c0cd7fa31f892cc2df76a454e1827522f54352
Size: 128.63 MB
Asianux Server 4 for x86
- kernel-2.6.32-696.20.1.el6.i686.rpm
MD5: e946279500784dc4a1b943bbbb7c6c38
SHA-256: b43e3b0e0de3ed111ff38b92d80e1dc77c64949803e98da7450c79d6d9079e5f
Size: 29.74 MB - kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm
MD5: fd5c9fa568303121df49ea8361c81fd0
SHA-256: e89e40be99895d897d24d2baa4647d3b6f620df02b94c4b127b7ce5503c99893
Size: 3.76 MB - kernel-debug-2.6.32-696.20.1.el6.i686.rpm
MD5: fec50dcd7fad76a318dfb237e73947b4
SHA-256: 20ed7adc7dc299648e5affd05ee0352328c6ef25f8b4d470d9c3900da2e0ddc4
Size: 30.53 MB - kernel-debug-devel-2.6.32-696.20.1.el6.i686.rpm
MD5: 82fcba81d032d9a60dced97bb5a5338c
SHA-256: 94ecbcc3e7f0e36f4343a328cb508a4f7b88cbe1f408697a54b829cf69e86f9f
Size: 10.73 MB - kernel-devel-2.6.32-696.20.1.el6.i686.rpm
MD5: 0640dd712159a6c7b670fff1ff9ec4ed
SHA-256: 7d7d4dbadab390f88ec95e9ce278509352d5f3806e27b653cf976de3e33602e1
Size: 10.69 MB - kernel-doc-2.6.32-696.20.1.el6.noarch.rpm
MD5: 9d948b7ab15555faa8b79a617116cf55
SHA-256: 3508d408ce4a1df4e8f876d276fe60a417e21aa22dd206d3fdc290a5d5726499
Size: 12.34 MB - kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm
MD5: e12599618c575a2ae789447ffb452885
SHA-256: 878d5a0c91a401363fe0f4fded6d839fad12acc725f2d14b43e19dd2fc982ee1
Size: 28.83 MB - kernel-headers-2.6.32-696.20.1.el6.i686.rpm
MD5: a26eb9c33f93ee5c2a305a469b88efd3
SHA-256: 0166a768043cca8365f0c46e8d12e0ccc583ca23ee40331268822df8a3127af6
Size: 4.48 MB - perf-2.6.32-696.20.1.el6.i686.rpm
MD5: 60d4006911e03c27211515f3920722e5
SHA-256: 47e8ae216841f7ecbd95db1ea7c10fb3e2017c63e50831bc315e0aa06277c8c8
Size: 4.71 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-696.20.1.el6.x86_64.rpm
MD5: 93366fc07cf173fce864f2ec974e4268
SHA-256: 7ffba002c41aa98e05d1077b9900ad68a8d6cc7eb971f551a45dd97110151677
Size: 32.05 MB - kernel-abi-whitelists-2.6.32-696.20.1.el6.noarch.rpm
MD5: 6ce4cfe023c0fec290ed9c88443f44be
SHA-256: 8456f9353fcd674913bfeca8fc2c8d4c002e400e501ab29de2dba2a8699b0346
Size: 3.76 MB - kernel-debug-2.6.32-696.20.1.el6.x86_64.rpm
MD5: bcd3c3605cd20b587c60f9bcc01cd5f2
SHA-256: 11fee69a901b1807f0ca7fe94203dac5b1e15cc598d062a88bccf13396c12703
Size: 32.93 MB - kernel-debug-devel-2.6.32-696.20.1.el6.x86_64.rpm
MD5: 59b3c8fcfe0286abfe33da011d19ba47
SHA-256: 69d77037db2c302e25535323f1bce528fa231022ea9530f1644b63042d454996
Size: 10.78 MB - kernel-devel-2.6.32-696.20.1.el6.x86_64.rpm
MD5: 5cb8406158ae8ac44cb4af8198568396
SHA-256: 7ecc9ebbab21c667890a8bd53b8670974adadd59c52d86a15797f85cd6804b0d
Size: 10.74 MB - kernel-doc-2.6.32-696.20.1.el6.noarch.rpm
MD5: 9b0cc284eb520b2d950b95b5c150ba2e
SHA-256: 2756033728c7d734c350345335845d7ac92863822bc7350f22e0cfdd8ab32ad4
Size: 12.34 MB - kernel-firmware-2.6.32-696.20.1.el6.noarch.rpm
MD5: 5310f0238af7b444002cb25410ba790c
SHA-256: 47555b5cdac0169811bff1f21291c9958877bcedaed4639fd6f9010826f040ce
Size: 28.83 MB - kernel-headers-2.6.32-696.20.1.el6.x86_64.rpm
MD5: e45960b9ba084bf8e08f3c234e57b52f
SHA-256: d7c50d10bcd8201fc8fa840cc449e1202c8954860df26bb1b138980b1ad28277
Size: 4.48 MB - perf-2.6.32-696.20.1.el6.x86_64.rpm
MD5: 10fbd615abae712a4fec669777eccdef
SHA-256: a56b466db842fb96fffc367dbdca8edab9ed5016aa22f99ecaad3c7e7be9e69b
Size: 4.68 MB