kernel-2.6.32-358.14.1.el6

エラータID: AXSA:2013-592:07

Release date: 
Thursday, August 8, 2013 - 21:47
Subject: 
kernel-2.6.32-358.14.1.el6
Affected Channels: 
Asianux Server 4 for ppc
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Security issues fixed with this release:

• CVE-2012-6548
The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.

• CVE-2013-0914
The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.

• CVE-2013-1848
fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.

• CVE-2013-2128
The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket.

• CVE-2013-2634
net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

• CVE-2013-2635
The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

• CVE-2013-2852
Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.

• CVE-2013-3222
The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

• CVE-2013-3224
The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

• CVE-2013-3225
The rfcomm_sock_recvmsg function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

• CVE-2013-3301
The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-358.14.1.el6.src.rpm
    MD5: 8f4397c61190a742bc550ed97965e89b
    SHA-256: a3af70984c5b4c3b8355509b8ab9488b732b4b364df7c468fe602fafa4f40e55
    Size: 85.10 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-358.14.1.el6.i686.rpm
    MD5: e60feda6351ef4f1223311c7e49587a6
    SHA-256: d00aa9fe3433590c5fd77cf1faae9415bb2e2c94d80b6ef45f5ee465a48ca608
    Size: 24.08 MB
  2. kernel-debug-2.6.32-358.14.1.el6.i686.rpm
    MD5: 24fd6bfd748e7cc200c6f75814bc0725
    SHA-256: eaeea58133437ba41639d5ff60fc1b1429510cf41641539af472b04cdff86c73
    Size: 24.62 MB
  3. kernel-debug-devel-2.6.32-358.14.1.el6.i686.rpm
    MD5: 18a29f5ecf0234c20c6b4f8ee9c9e00c
    SHA-256: 342d17dbb7623e7a7c43d6a5b7feaa7aca5134c73a8edb38af97f1398906e5b2
    Size: 8.19 MB
  4. kernel-devel-2.6.32-358.14.1.el6.i686.rpm
    MD5: 1d6217f386296c0b2fa454bf444ddd6a
    SHA-256: 6deba32039504a4f600e9d79e90a82f365add7bd2a5313cee13d68f0b77e955d
    Size: 8.15 MB
  5. kernel-headers-2.6.32-358.14.1.el6.i686.rpm
    MD5: 7ffcea7348e78282d18b728dfe54f645
    SHA-256: 20a188e9775e8234974336d3b8c362dbe9d7a96c6d4e0ecaf853ad112744557f
    Size: 2.33 MB
  6. perf-2.6.32-358.14.1.el6.i686.rpm
    MD5: 6712d7d9d635bbbfdfc03c377d09822c
    SHA-256: 44bb8914e305975c213d5d824d97fea93979d332d0a9f23b4c06deb9d0eec119
    Size: 2.04 MB
  7. kernel-doc-2.6.32-358.14.1.el6.noarch.rpm
    MD5: 0b691ae20646a1e05fbb21510e652f88
    SHA-256: a1365efb872983db6a3a95eeb3f0b295589d89619af08acb2ddfd2b8a186cbf9
    Size: 9.95 MB
  8. kernel-firmware-2.6.32-358.14.1.el6.noarch.rpm
    MD5: d8d7c00a29f8a328a3a72648c74dbee6
    SHA-256: 9839432e92240ada20f041041751f99414e09cc37c3982308db5454b97883577
    Size: 10.94 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: 2d7660ff679efaba4132ec8e99400a64
    SHA-256: 66f0d5c3bd66ed8f16fa7759717ec0d1f4d3fae82c42525236ef5515de1ddb85
    Size: 26.12 MB
  2. kernel-debug-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: 3ddc822c242dc83d001f71282532478b
    SHA-256: 47e7cd819c935a26e69d167e6807dfa0df6f8419a972b0c26018273960db9445
    Size: 26.74 MB
  3. kernel-debug-devel-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: 8f4d6f9f389f6adf7d3b7637b612198d
    SHA-256: cf206fa3d700018121f1fc6b00f08f73fcd69175ef192dc5c18b9d61fe877bbd
    Size: 8.23 MB
  4. kernel-devel-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: ad4e954e42bb51176cbee4c283c41766
    SHA-256: 1ea5006ea429de95b959d208edbe259932f18ae2bdb3cdd283bbf1ba60d64358
    Size: 8.19 MB
  5. kernel-headers-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: 92056bd54b5076bb44fd828a002470cb
    SHA-256: ff263ad91f04941e8af542674f0c7ad06d935339622f9535e5438dd3f28941f4
    Size: 2.33 MB
  6. perf-2.6.32-358.14.1.el6.x86_64.rpm
    MD5: 84b785f7aff86170505b1661d1948dd2
    SHA-256: fc74d1730fbb6261d11002fb1285656b3d18870e890dba04259c36b515cc67af
    Size: 2.06 MB
  7. kernel-doc-2.6.32-358.14.1.el6.noarch.rpm
    MD5: 3e6b4a94707d2f4934219cb4c45d903e
    SHA-256: d8a0106c893e9dd06ab721603f6fc75ba55b999dd214476eba78795316727b44
    Size: 9.95 MB
  8. kernel-firmware-2.6.32-358.14.1.el6.noarch.rpm
    MD5: 26c24637edd976022854e0c0b60fcf92
    SHA-256: a40b471e82b836edee7165c51e778a464e6cefe46a76988ab96be9602004489e
    Size: 10.94 MB