kernel-2.6.32-431.11.2.el6

エラータID: AXSA:2014-258:01

Release date: 
Wednesday, April 16, 2014 - 16:39
Subject: 
kernel-2.6.32-431.11.2.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Security issues fixed with this release:

• CVE-2012-6542
The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument.

• CVE-2012-6544
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.

• CVE-2012-6545
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.

• CVE-2013-0343
The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux kernel through 3.8 does not properly handle problems with the generation of IPv6 temporary addresses, which allows remote attackers to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information, via ICMPv6 Router Advertisement (RA) messages.

• CVE-2013-1860
Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device.

• CVE-2013-1928
The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.

• CVE-2013-1929
Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.

• CVE-2013-2141
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.

• CVE-2013-2146
arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.

• CVE-2013-2164
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.

• CVE-2013-2206
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.

• CVE-2013-2224
A certain patch for the Linux kernel 2.6.32 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.

• CVE-2013-2232
The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.

• CVE-2013-2234
The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.

• CVE-2013-2237
The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.

• CVE-2013-2851
Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name.

• CVE-2013-2888
Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.

• CVE-2013-2889
drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.

• CVE-2013-2892
drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.

• CVE-2013-2929
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.

• CVE-2013-3231
The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.

• CVE-2013-4162
The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.

• CVE-2013-4299
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.

• CVE-2013-4345
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.

• CVE-2013-4387
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.

• CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.

• CVE-2013-4591
Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname on an NFSv4 filesystem.

• CVE-2013-4592
Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.

• CVE-2013-6367
The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value.

• CVE-2013-6368
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.

• CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

• CVE-2013-7263
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.

• CVE-2013-7265
The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

• CVE-2014-0055
The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.

• CVE-2014-0069
The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.

• CVE-2014-0101
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.

Main fixed bugs:

• Fixed a performance problem in the bonding driver that affected bridges and loopback interfaces: the bonding module does not drop TCP segmentation offloading features for NO_CSUM devices any longer.

• Fixed bonding issues over VLAN with Solarflare network cards.

Solution: 

Update packages.

Additional Info: 

<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-3231>CVE-2013-3231</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4162>CVE-2013-4162</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4299>CVE-2013-4299</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4345>CVE-2013-4345</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4387>CVE-2013-4387</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4470>CVE-2013-4470</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4591>CVE-2013-4591</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-4592>CVE-2013-4592</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-6367>CVE-2013-6367</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-6368>CVE-2013-6368</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-6381>CVE-2013-6381</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-7263>CVE-2013-7263</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2013-7265>CVE-2013-7265</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2014-0055>CVE-2014-0055</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2014-0069>CVE-2014-0069</A>
<A HREF=http://cve.mitre.org/cgi−bin/cvename.cgi?name=CVE-2014-0101>CVE-2014-0101</A>

Download: 

SRPMS
  1. kernel-2.6.32-431.11.2.el6.src.rpm
    MD5: 74263f632ab33b9d83e334502eecd2bd
    SHA-256: f1b31317a66c06c130f7fa5208375ce29e8d94f711983846accef7b5f208d286
    Size: 91.06 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-431.11.2.el6.i686.rpm
    MD5: b719ff1e8f076efdd2e0c97a55513db7
    SHA-256: 4476bddda5b4ccc0923b6a1697c4abadfcb5ff0d6c6b3280e08dbd5e422b55f0
    Size: 25.58 MB
  2. kernel-doc-2.6.32-431.11.2.el6.noarch.rpm
    MD5: ff79ec53ef6c2ab3e3401724b9a13468
    SHA-256: bd7cd4adc52fa070403e17222ef510bf1b94a715d2aab5d75ed93d85ec4b34a1
    Size: 10.52 MB
  3. kernel-headers-2.6.32-431.11.2.el6.i686.rpm
    MD5: d7c063ab4c15f59ea63105cb2e56b4a2
    SHA-256: e89c1a26bbf8abaa795c0694a6335ffd20c0549d59e67ccb525c01625f49c7a6
    Size: 2.84 MB
  4. kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm
    MD5: 3a6b58adc79afb6ee685d6b6bf7968c8
    SHA-256: 72d96acb36c3417a35610ee58ec07660229ea7e612b768aefe108d39c1a9df82
    Size: 12.98 MB
  5. perf-2.6.32-431.11.2.el6.i686.rpm
    MD5: 91e824e7202e459d6b9184eced6dbb82
    SHA-256: 6f47f884e34a62b10a188ffb3797099d01af02e0a9ede47c1447fab8f9e39558
    Size: 2.92 MB
  6. kernel-devel-2.6.32-431.11.2.el6.i686.rpm
    MD5: 54a5c975437e28cc8268985cf3c8403c
    SHA-256: 154dbb7484434f2691ec33b98a7ff6142a3d1a486062224fc7335f15987c9e43
    Size: 8.73 MB
  7. kernel-debug-2.6.32-431.11.2.el6.i686.rpm
    MD5: 7bbf64f411fdfb1b02c5488e4c6e8787
    SHA-256: f124cf87fd6c47bfddca2abdfb40b7d5b8cf9b1c8a1f3bf4fa265d80950e1d2f
    Size: 26.16 MB
  8. kernel-debug-devel-2.6.32-431.11.2.el6.i686.rpm
    MD5: 7b6643c709e524393d8529121beba6d4
    SHA-256: 861db46ad6e96fb63fa347cd7919249fc84de4a38bfbd34438c0672b623de0b6
    Size: 8.76 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: 326b5f8ced0327aee73fa0f2cba55bcc
    SHA-256: 3312c7e75feef6c9438e18896668f2f9acdfcf42d375b8d813538725ba3a6887
    Size: 27.71 MB
  2. kernel-doc-2.6.32-431.11.2.el6.noarch.rpm
    MD5: 8ca0d2035dc45def32edee23a62b359e
    SHA-256: 408fe6b64a03518ba4beba5ff70786cc6dd937f06faaac1e796d9a29353f3f71
    Size: 10.52 MB
  3. kernel-headers-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: 254026270bf53665d8d87d98fa7c0c66
    SHA-256: 58c6b69287b5ed3ee7b4c1a754edeab7ee8c2f986231bd46a2253889f097cc66
    Size: 2.84 MB
  4. kernel-firmware-2.6.32-431.11.2.el6.noarch.rpm
    MD5: bb9e26210e9aae89ac64c9c032f0afd4
    SHA-256: 239ddde65633c134809661d6af7653290156c7d6a109ac4c5b8457dbf964b393
    Size: 12.98 MB
  5. perf-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: ee19b54ba5febaa436b7a0c1ce9e93e7
    SHA-256: e84eea3454089c6572ff5e83364b42c61179de7aa9d3ba387121d9acf1f00daa
    Size: 2.89 MB
  6. kernel-devel-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: 366498fb24664e589897e4f937af3cee
    SHA-256: 473ec7cbc4f944ed1e74128c974511289b324a2a739f5348ede54ff320136ae9
    Size: 8.77 MB
  7. kernel-debug-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: d782e4360d5cf7aaa3441b377ce15486
    SHA-256: 14bc40752003e2f70ffad1f8a2a3e62800daa00041a03e91ea03b4fb2be61148
    Size: 28.39 MB
  8. kernel-debug-devel-2.6.32-431.11.2.el6.x86_64.rpm
    MD5: 9ccf3aa205e197137944dbb4b34f2318
    SHA-256: 3f6e322fa053648d54b24626d5f0bfbccf2045a79d2869aab8fdba9e4770477e
    Size: 8.81 MB