kernel-2.6.32-131.17.1.el6
エラータID: AXSA:2012-09:01
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2011-1745
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
CVE-2011-1746
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
CVE-2011-2484
The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
CVE-2011-2723
The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic.
CVE-2011-1160
CVE-2011-1833
CVE-2011-2496
CVE-2011-2521
CVE-2011-2898
CVE-2011-2918
No information available at the time of writing, please refer to the CVE links below.
Fixed bugs and enhancements:
see changelog
Update packages.
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic.
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.
The x86_assign_hw_event function in arch/x86/kernel/cpu/perf_event.c in the Performance Events subsystem in the Linux kernel before 2.6.39 does not properly calculate counter values, which allows local users to cause a denial of service (panic) via the perf program.
net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application.
The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
N/A
SRPMS
- kernel-2.6.32-131.17.1.el6.src.rpm
MD5: 70edc21780f42cc5cdc1ae2d0b388c4d
SHA-256: ada061b73e116322885e15732a6079038545a7eab4d10b740c31d2233950fce2
Size: 67.35 MB
Asianux Server 4 for x86
- kernel-2.6.32-131.17.1.el6.i686.rpm
MD5: 7ce073579fa10caf7c478a932db7de77
SHA-256: f11374104676ddb44e580c0b57c35e6f462be50f958a352489b09c9a7933deee
Size: 21.46 MB - kernel-debug-2.6.32-131.17.1.el6.i686.rpm
MD5: 058fe5216c67e2be23539ce4710a1e6b
SHA-256: 34cc008d48f6ad1f43812bb1aad15c6ac4f7db550781209450a3cbf7f996717a
Size: 21.94 MB - kernel-debug-devel-2.6.32-131.17.1.el6.i686.rpm
MD5: c6a24a951a64ca887854bbbc0bc5a14d
SHA-256: 1bf4be830abefd8c8c0f7d3ba35e6bcee3f39ca6526eb1fdf49d4235b8ccca49
Size: 6.93 MB - kernel-devel-2.6.32-131.17.1.el6.i686.rpm
MD5: db7a7502c41c146633e7c8566429cb7b
SHA-256: b7389ee882fb46ba6c2d1322b1f7f89bc435165ff6b99d6f86653db31ddd1224
Size: 6.89 MB - kernel-headers-2.6.32-131.17.1.el6.i686.rpm
MD5: 264028129fd4502f91fa300d0f466d0e
SHA-256: fd2387a6b2e970e74268e5bd5ff7aba3126726b4c50a66d2f89d9f0686dbe781
Size: 1.33 MB - perf-2.6.32-131.17.1.el6.i686.rpm
MD5: 7a2a1f292f89c31edddc8ae2cbd9871d
SHA-256: e7f72fea003e96ba06838a3bce180fc5c7912632a43173b49bc03ab26448399a
Size: 0.96 MB - kernel-doc-2.6.32-131.17.1.el6.noarch.rpm
MD5: e84da69fc61d160a5a3b2d56021c5787
SHA-256: a2ace2188c6a043de7811155f8d677b821e76b3c76128f49ede8e8a50e1c5d3b
Size: 8.83 MB - kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm
MD5: 42c0fb926c5e77b71454336a00d500a9
SHA-256: 698cd0a67a0490a9f45343b4a9379dccbd0e420655507b451d62487e3eff189d
Size: 2.55 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-131.17.1.el6.x86_64.rpm
MD5: 681137ecfa5f0ddaae553364fcb972c7
SHA-256: 39db9b1a65711170806be255f91af4231181506a7fe17b02e81f4d1b148d0ce0
Size: 23.29 MB - kernel-debug-2.6.32-131.17.1.el6.x86_64.rpm
MD5: 48332f000e17251e2c09bfca00178cdc
SHA-256: 73fc20d5a13532ce9693c0fdaa478ce33924e03f10541ca5acc5d9b1e16e3c78
Size: 23.84 MB - kernel-debug-devel-2.6.32-131.17.1.el6.x86_64.rpm
MD5: f32ed314ee307e0fbd8979cf6eea72a3
SHA-256: e33de3863c82a5088cf7af0f4823038d26896126c717dc4e16d37d94b03f4ae8
Size: 6.97 MB - kernel-devel-2.6.32-131.17.1.el6.x86_64.rpm
MD5: 316a0315a62cc6e0b39f964f3b3a271e
SHA-256: 6ed77f7bca04b9b16be0cedbecb59246d34ad1176724473b1f0d34651fed6876
Size: 6.93 MB - kernel-headers-2.6.32-131.17.1.el6.x86_64.rpm
MD5: 5455c4ba0176ffdb5e060852ae431b2b
SHA-256: b058d402ed36611fa0b5294c57c9b14e88da24563fd94371444fa84e0ea235ae
Size: 1.33 MB - perf-2.6.32-131.17.1.el6.x86_64.rpm
MD5: 3fe93c40cf3cca9b4c1cd0dd54330b23
SHA-256: 31e7b690e042f62331fb104e552c3c255de47fa495dad80040ae1cca9f223849
Size: 0.98 MB - kernel-doc-2.6.32-131.17.1.el6.noarch.rpm
MD5: c2d3c967f8bf6b93658a1a8dbe788e84
SHA-256: b2bcb92276ca46483d6d88d539496bb86c0d03444345f540bb663b68db24ce92
Size: 8.83 MB - kernel-firmware-2.6.32-131.17.1.el6.noarch.rpm
MD5: f3d457186690e2e8045010c4289c6507
SHA-256: 16286264a9d23e51f8198ebfda1fdf9e2fdd6af092bc18f717f1e76661f4dc3b
Size: 2.55 MB