kernel-2.6.32-279.14.1.el6

エラータID: AXSA:2012-1018:09

Release date: 
Thursday, December 13, 2012 - 13:58
Subject: 
kernel-2.6.32-279.14.1.el6
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Security issues fixed with this release:

• CVE-2012-2313
The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.

• CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.

• CVE-2012-2390
Memory leak in mm/hugetlb.c in the Linux kernel before 3.4.2 allows local users to cause a denial of service (memory consumption or system crash) via invalid MAP_HUGETLB mmap operations.

• CVE-2012-3430
The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.

• CVE-2012-3552
The IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.

• CVE-2012-3412
The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.

• CVE-2012-1568
No description available at the time of writing, see the CVE links below.

• CVE-2012-2133
Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

• CVE-2012-3400
Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.

• CVE-2012-3511
Multiple race conditions in the madvise_remove function in mm/madvise.c in the Linux kernel before 3.4.5 allow local users to cause a denial of service (use-after-free and system crash) via vectors involving a (1) munmap or (2) close system call.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-279.14.1.el6.src.rpm
    MD5: 860c9965916609ea33d1669fa04c7baa
    SHA-256: 9c33635db8d552cc85be515ba9697a66f9e99b44e3ef51210259f3b9555c6081
    Size: 81.69 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-279.14.1.el6.i686.rpm
    MD5: cd2118643ae64dbfc318626063fadfa3
    SHA-256: 027e96a2506735abb118aa5e7e263a904c7628108f74140a90153a847ab6c85b
    Size: 23.24 MB
  2. kernel-debug-2.6.32-279.14.1.el6.i686.rpm
    MD5: 9f325c58636cbe86c71bd4e7af6b8d73
    SHA-256: 54e9bc48b6a6fc2d87caba150ad263b6ec73ff36838e792459dbb7725fcafdc7
    Size: 23.74 MB
  3. kernel-debug-devel-2.6.32-279.14.1.el6.i686.rpm
    MD5: da0e2738dbe12c74068bbb314efcedf7
    SHA-256: a629ddf6b27f2f5e9e9eca450815f89756f6e14612b9fb01c259d11205b54e1c
    Size: 7.65 MB
  4. kernel-devel-2.6.32-279.14.1.el6.i686.rpm
    MD5: d009624bedb3727a8cde1472ce031ceb
    SHA-256: cb13844f1acbb29160ec7941231e91faad47696d9eeff326d4e6d4beeacf8677
    Size: 7.61 MB
  5. kernel-doc-2.6.32-279.14.1.el6.noarch.rpm
    MD5: 5120ea36c1cf7a18d43592ada611b87d
    SHA-256: cd716fa3d2a170ba1393927519c99fdb77b13572bd57843236a58190bad52de6
    Size: 9.48 MB
  6. kernel-firmware-2.6.32-279.14.1.el6.noarch.rpm
    MD5: af6af682cfde512c72102feadbd2f1f5
    SHA-256: c73ddf2119e8d4390949c8616290350b15924cb3e4dac590739bdc180461c1c4
    Size: 8.69 MB
  7. kernel-headers-2.6.32-279.14.1.el6.i686.rpm
    MD5: 9b3ce8953c09800e8e98c4df7fc0d991
    SHA-256: ba9f0df7d9f33b1809749767222ebfc7c0024983217f95ddb82d57e0ec78cf21
    Size: 1.91 MB
  8. perf-2.6.32-279.14.1.el6.i686.rpm
    MD5: 26f32a90cb7635d0231687b4e7a1cc8d
    SHA-256: 499f8e31410b216c28e25677b0bd37ae5c227b7908be0738e753acd8f8cd798f
    Size: 1.56 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-279.14.1.el6.x86_64.rpm
    MD5: 0e83acf41da98dc681cde0b6892e6a68
    SHA-256: 048ddc0228bbce27d4e183fe65aeb7b4b2b8f6d064252c4c6000c9209651fa50
    Size: 25.26 MB
  2. kernel-debug-2.6.32-279.14.1.el6.x86_64.rpm
    MD5: bb0c49604c528c0651104a56d9c8756b
    SHA-256: faa428f26e9eeae1da6204d10df393a1eacf586240a0d2ebe98404e937315be2
    Size: 25.84 MB
  3. kernel-devel-2.6.32-279.14.1.el6.x86_64.rpm
    MD5: 430a84c816a2ca0acb124a721ac1985f
    SHA-256: b8259b4e078d58bfb8e67e52c78910836e52e4ee759cbded25ac474bd9f3b067
    Size: 7.65 MB
  4. kernel-doc-2.6.32-279.14.1.el6.noarch.rpm
    MD5: 0c28a63c4cb4e263c086132f1562b8e0
    SHA-256: a0dda0b5435ff0d53fda799a01755ae3ac0f17a494672e9fa69724d1daf23125
    Size: 9.48 MB
  5. kernel-firmware-2.6.32-279.14.1.el6.noarch.rpm
    MD5: 025e783073c422fcc6cab4ab88ee6efb
    SHA-256: 4613fe41b8e592cc3dfa08a6b8803309418d6745ed9e5f53fa01e0a18d37beed
    Size: 8.69 MB
  6. kernel-headers-2.6.32-279.14.1.el6.x86_64.rpm
    MD5: 1865edb87a6cd893e96439a8c72aa280
    SHA-256: db8962109e097d16b88d7157b9d6190d825e50f62348688d6fdc643132b7483e
    Size: 1.91 MB
  7. perf-2.6.32-279.14.1.el6.x86_64.rpm
    MD5: ea59d90e097931a928fa5f30ad797132
    SHA-256: 945cb52f0427459579f9cfbed9dd1b1b4c555c8f974119d2d3377f20b664e4fd
    Size: 1.58 MB