kernel-2.6.32-358.6.1.el6

エラータID: AXSA:2013-454:03

Release date: 
Friday, May 24, 2013 - 19:59
Subject: 
kernel-2.6.32-358.6.1.el6
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Security issues fixed with this release:

• CVE-2012-6537
net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.

• CVE-2012-6538
The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an incorrect C library function for copying a string, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.

• CVE-2012-6546
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

• CVE-2012-6547
The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

• CVE-2013-0349
The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel before 3.7.6 does not properly copy a certain name field, which allows local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call.

• CVE-2013-0913
Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.

• CVE-2013-1767
Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.

• CVE-2013-1773
Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.

• CVE-2013-1774
The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.

• CVE-2013-1792
Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.

• CVE-2013-1796
The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.

• CVE-2013-1797
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.

• CVE-2013-1798
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

• CVE-2013-1826
The xfrm_state_netlink function in net/xfrm/xfrm_user.c in the Linux kernel before 3.5.7 does not properly handle error conditions in dump_one_state function calls, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability.

• CVE-2013-1827
net/dccp/ccid.h in the Linux kernel before 3.5.4 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for a certain (1) sender or (2) receiver getsockopt call.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-358.6.1.el6.src.rpm
    MD5: ec4a443d77388a64300859c25f149c97
    SHA-256: dcd56a6b130579e7444f40faf0b956d863b00c91e12dc99a7d0489f0765852e4
    Size: 85.09 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-358.6.1.el6.i686.rpm
    MD5: e226edf730ed6e6366471734c570e1f8
    SHA-256: f0166a6ae5dce479c820c7bf0b1c28fdc759b97e5d322c337999c770c7d0c92d
    Size: 24.07 MB
  2. kernel-debug-2.6.32-358.6.1.el6.i686.rpm
    MD5: 5732f33832bd45744920916d0d4ea042
    SHA-256: 92b87df3ec76c7c8ce3e072787bb76605792c161e82867a155cce16b4ca1b949
    Size: 24.60 MB
  3. kernel-debug-devel-2.6.32-358.6.1.el6.i686.rpm
    MD5: 6e4c46d33aa81c37c12758e54d7acbac
    SHA-256: fa1b8ff30004c86f623042c2d51b005c0a591987afdea98e84036880f5da6971
    Size: 8.17 MB
  4. kernel-devel-2.6.32-358.6.1.el6.i686.rpm
    MD5: 6fadbd4e4a6c209389c36a39f0640425
    SHA-256: e997c5224d3a1f6035da9437a224e9cf5b4527ef4656c631477851b5ddc6a6c1
    Size: 8.14 MB
  5. kernel-doc-2.6.32-358.6.1.el6.noarch.rpm
    MD5: 2fafe06fb1b2f08bc917cc2200bbfb6a
    SHA-256: c0f035cdbceb1091db3a541c2c9a4f28b916f4ecdd8ca6e8419b6951cb6d3931
    Size: 9.94 MB
  6. kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm
    MD5: 53f5e5b7edd8bb48ff489c0365669b72
    SHA-256: 5959cd29fe7720fd64e982c153770eed6a676e1bf9dbf7f09e528339f38bddab
    Size: 10.93 MB
  7. kernel-headers-2.6.32-358.6.1.el6.i686.rpm
    MD5: a6723aac9855b4771354a4f0617bc4e3
    SHA-256: 3d9be54658d722883f503c619254e39280e7c0a4e84dc1f0b26f4c23b0642ca8
    Size: 2.32 MB
  8. perf-2.6.32-358.6.1.el6.i686.rpm
    MD5: 3c14cb7b87578a9abadfdfd68377e7bb
    SHA-256: ad93482de1a11ab2c4f1eebcd111c83717fc462968a745e5c6c194b762045b1d
    Size: 2.03 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: 30d49a2b5bbc57fe8096facc9237d979
    SHA-256: 84ba1fa1603eaa0cdbfb7d555c0f0416f6624c3b8c8fde063be1f503cac348a4
    Size: 26.11 MB
  2. kernel-debug-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: 8d31faf1530f463d04c07225dac3e74c
    SHA-256: a4de0faa4cb2fd2f7ce0e5062ca2a248470fe4e4d6a9f4162f69a6b3b8ce1f4c
    Size: 26.73 MB
  3. kernel-debug-devel-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: f30ce586299a094c971a69be495c5546
    SHA-256: 6c8d12c9d5a38f17e89277f6178ded447c1b775afe251d0c5eae573a994a82e5
    Size: 8.22 MB
  4. kernel-devel-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: ccff9225a23488bccff6eee624e9ff8c
    SHA-256: 7df42bd90d75cf0a3db22c769fddd38c94478be5061be593ad7076e23373bbfc
    Size: 8.18 MB
  5. kernel-doc-2.6.32-358.6.1.el6.noarch.rpm
    MD5: 50367f6c4770d7ac83ee3d244987b228
    SHA-256: 97df86efd69dcfaedccfad06c5435d5bd8aa7dab698a0dd384e5d674919c75f7
    Size: 9.94 MB
  6. kernel-firmware-2.6.32-358.6.1.el6.noarch.rpm
    MD5: 49d194c474d6e054fb2b5a3a3f6a90b5
    SHA-256: a6b3cff4c2b9c2bc0294ead18d435e69ac94820ec8df65d1df6fd37328dd3763
    Size: 10.93 MB
  7. kernel-headers-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: 7d686db0b3f5190d3a10c9c722568a53
    SHA-256: a6e88434d18dc78d2aefc06cff0456390876f5434208934230e9bddb1ff82beb
    Size: 2.32 MB
  8. perf-2.6.32-358.6.1.el6.x86_64.rpm
    MD5: d3005c8a6ae43dc32b626507da30a7b8
    SHA-256: d03b2172acd769a79d6ba36c72d8a45645806e817f5159ba27421ff51dea560d
    Size: 2.05 MB