kernel-3.10.0-693.21.1.el7
エラータID: AXSA:2018-2625:03
リリース日:
2018/03/19 Monday - 09:43
題名:
kernel-3.10.0-693.21.1.el7
影響のあるチャネル:
Asianux Server 7 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- arch/x86/kvm/mmu.c には、ネストされた仮想化が使われている際に、ゲスト
の仮想アドレス解決のためのゲストページテーブルエントリーを正しく解釈し
ないため、L1 ゲスト OS ユーザーにより、ホスト OS 上で任意のコードの実行、
もしくはサービス拒否 (ページウォーク中の不正なインデックス、およびホスト
OSのクラッシュ) を引き起こすおそれのある脆弱性が存在します。
(CVE-2017-12188)
- KVMモジュールには、 syscall命令のエミュレーションにおける EFLAGS
レジスタのトラップフラグ(TF)ビットの扱いに欠陥があり、ゲストスタックで
デバッグ例外(#DB)が発生し、ゲスト内のユーザ、プロセスがこれを利用して、
ゲスト内の権限を昇格させることができる可能性のある脆弱性が存在します。
なお、Linuxゲストはこの影響を受けません。(CVE-2017-7518)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2017-12188
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
CVE-2017-7518
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-3.10.0-693.21.1.el7.src.rpm
MD5: e1b834cf6995f6def70bcccd33103f37
SHA-256: 315913be1d6b630e88fb1f116174a4492465541ec3b6fa2533f4aa11cc9e9858
Size: 88.95 MB
Asianux Server 7 for x86_64
- kernel-3.10.0-693.21.1.el7.x86_64.rpm
MD5: 4af31b74e7f9a0ecd47cdedf0e44fa4e
SHA-256: 04d90604868f56ce898945cd2db680133908fd97d5493fbba04a3eae0d1eac6c
Size: 43.24 MB - kernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm
MD5: 9ff9097049c681bc62c28a136bea7633
SHA-256: 8f3f12df999d13a431ced358f550f3c7ba40da4fd25fe087fdc51db3ed7f0a10
Size: 5.07 MB - kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm
MD5: d49a330e8ffaae4b8d7f0343ff187520
SHA-256: 57c3805fceca04efd3de65a576e0fbb914d273fbfdd6c533bdd821924605fdaa
Size: 45.18 MB - kernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm
MD5: d684de0cc2ed4a703b6bbf763e5b32c7
SHA-256: 7095644f526c877c6721e46989a3c7b0f658de33fdd4af0ce350c639cd4871c1
Size: 14.44 MB - kernel-devel-3.10.0-693.21.1.el7.x86_64.rpm
MD5: 00bbd609cf084846e540b03d5c34ff7d
SHA-256: 7e10b15486a33b1404105f18c09b8da801699a832a677bc5af94e30190e3ac4d
Size: 14.37 MB - kernel-doc-3.10.0-693.21.1.el7.noarch.rpm
MD5: 7f5731862c3bb5adf4150bf7fa4d670b
SHA-256: 62cd6f83943174ae2a3d37d9a43e4dca017df466e4bc20542823fa849ff9e25d
Size: 16.25 MB - kernel-headers-3.10.0-693.21.1.el7.x86_64.rpm
MD5: b291ce1043db804e3803575ab9de4556
SHA-256: 8bd5eb203d282a3ac53397eabfe919926fe11b51903d0ef155d0df7803c6826f
Size: 6.00 MB - kernel-tools-3.10.0-693.21.1.el7.x86_64.rpm
MD5: 5aa9d37bf16eb85373328c81fb479030
SHA-256: 411958f2ae289044cb7a347db835d9f5c6689640882a4c2f76c9afc38d2a1a46
Size: 5.15 MB - kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm
MD5: bd4c6dbfa661aec889382aec354e942b
SHA-256: 81b8de5ffe07a50c6594ac1ae75b38c929ab9d961999982174f717c30fcc21ae
Size: 5.07 MB - perf-3.10.0-693.21.1.el7.x86_64.rpm
MD5: 0740527b8b7a246934d7530f48a3d146
SHA-256: 1b0c70260f9c7e1c7554d0b64ddbfabe35345d1677f4575054bd361412a8049d
Size: 6.47 MB - python-perf-3.10.0-693.21.1.el7.x86_64.rpm
MD5: ee40d972ccafeab42f904b4de8251db3
SHA-256: b9e413964f1a92d38e1db409b18ed97cf20d3a1feee57f2db8c46f6c451f05a1
Size: 5.16 MB