kernel-2.6.18-371.3.AXS3

エラータID: AXSA:2014-405:01

Release date: 
Tuesday, June 24, 2014 - 17:44
Subject: 
kernel-2.6.18-371.3.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

Security issues fixed with this release:

• CVE-2012-4398
The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.

• CVE-2012-6638
The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663.

• CVE-2013-2888
Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.

• CVE-2013-0343
The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux kernel through 3.8 does not properly handle problems with the generation of IPv6 temporary addresses, which allows remote attackers to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information, via ICMPv6 Router Advertisement (RA) messages.

• CVE-2013-4299
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.

• CVE-2013-4345
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.

• CVE-2013-4368
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.

• CVE-2013-4355
Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.

• CVE-2013-4494
Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.

• CVE-2013-2929
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h.

• CVE-2013-4483
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.

• CVE-2013-4554
Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.

• CVE-2013-6381
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.

• CVE-2013-6383
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.

• CVE-2013-6885
The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.

• CVE-2013-7263
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.

Fixed bugs:

• Re-ordered the tasks in the RPC wait queue to fix a race condition between the rpc_wake_up_task() and rpc_wake_up_status() functions introduced by a recent modification to the sunrpc code.

• Previously, running a background process on a GFS2 file system could trigger a glock recursion error leading to a kernel panic. This has been fixed and readpage operations do not attempt to take a glock that was already held any longer.

• Fixed a kernel panic that happened when the kernel dereferenced a NULL pointer; this was due to an incomplete backport to the IUCV code.

• Previously, GFS2 prevented glock work queues from freeing glock-related memory while the glock memory shrinker queued a large number of demote requests. Because of this bug, glock work queues became overloaded and resulted in a high CPU usage rendering GFS2 file systems unresponsive for a while. This has been partially fixed: this still happens but only on extremely high work loads.

• With the recent addition of the NT LAN Manager Security Support Provider (NTLMSSP) authentication mechanism, a regression was introduced resulting in the impossibility to mount multiple SMB shares with different credentials to the same server. This has been fixed.

• The igb driver now uses a a 32-bit mask as expected, instead of the previous 16-bit mask that disrupted the flow control a network device.

• Previously, when a kernel panic occurred on a system utilizing IPMI without Kdump being set up, it could trigger a second kernel panic. This has been fixed.

Enhancement:

• It is now possible to change the 60 seconds timeout for SCSI task management commands within the range from 5 to 180 seconds: modify the "lpfc_task_mgmt_tmo" parameter for the lpfc driver.
The system must be rebooted for this update to take effect.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.18-371.3.AXS3.src.rpm
    MD5: 7a26d4b1c5969df67c4a86a07ea9e8af
    SHA-256: 167f37d27071daeedebf3c29eef2a970c4182c9d5bb603bfbfd45a9bcfe36bb4
    Size: 65.52 MB

Asianux Server 3 for x86
  1. kernel-2.6.18-371.3.AXS3.i686.rpm
    MD5: 39fbbd645c61b8030c0f00468291abba
    SHA-256: 6b62ee43c0f024df0c6e82e740ba6f7fe6e2e2c81a2259e82cf8429a11416227
    Size: 19.77 MB
  2. kernel-devel-2.6.18-371.3.AXS3.i686.rpm
    MD5: fbb3a2da81277d107d347e3cde5fe83d
    SHA-256: 888aa6bb5f945edda98ce0ef9117562a6c7e95b2a2ceb1ca3e2b417128edcc61
    Size: 5.88 MB
  3. kernel-doc-2.6.18-371.3.AXS3.noarch.rpm
    MD5: 83e6c40ab31a1ff5b555ce0c8b463406
    SHA-256: 666fc4137f6a5bb2646fdad06b8d42d26fadecac6a72586233fe7415d2bc0085
    Size: 3.48 MB
  4. kernel-headers-2.6.18-371.3.AXS3.i386.rpm
    MD5: a62023e373b675ce30c76166d9942309
    SHA-256: adf07f0f610ed1f15df6eeb7cf8cac22413034be2947d49c882b612418416503
    Size: 1.46 MB
  5. kernel-PAE-2.6.18-371.3.AXS3.i686.rpm
    MD5: 371a34966f1d544c9a573fee89a9cea8
    SHA-256: 4bc7f50178c6a4b224d17310d674231d49283be28a1ef09571289e8d5d2e37e7
    Size: 19.79 MB
  6. kernel-PAE-devel-2.6.18-371.3.AXS3.i686.rpm
    MD5: aec93e154940c40266013ab5d6858112
    SHA-256: 20f456d6bfbc534452a9cfb7073e94ab7182210e09e68e962202a44015d5391e
    Size: 5.89 MB
  7. kernel-xen-2.6.18-371.3.AXS3.i686.rpm
    MD5: cf1dd23d8112fe8c072c5beb05ffbcce
    SHA-256: 1b21b2dca2d531909e75e2c8305f067a0c0ec180cd45ba9c2bc00c121ec4c27e
    Size: 20.89 MB
  8. kernel-xen-devel-2.6.18-371.3.AXS3.i686.rpm
    MD5: 4cda7c1009d4bf36ee59658501b50686
    SHA-256: 98108ede1cc58fddbbb452dcf26a9029a6764bca500378c7d161cdc4fd26ee14
    Size: 5.89 MB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-371.3.AXS3.x86_64.rpm
    MD5: 445e9caf4461cee0653b55886993315a
    SHA-256: c917b48bac83e0cb6471b2db0b298bb6373616e7d45c586bfaa753fba62fde04
    Size: 21.90 MB
  2. kernel-devel-2.6.18-371.3.AXS3.x86_64.rpm
    MD5: 652284fbae9160bb39cddc4a03231035
    SHA-256: 2938dde5b757fb0e8d1338c7bec2535e94f5cf3cca9a6d2931d5856649de5bec
    Size: 5.89 MB
  3. kernel-doc-2.6.18-371.3.AXS3.noarch.rpm
    MD5: 64367896cec4c2a2786bd80577328178
    SHA-256: 221ab9df2ec232c858b8c2939acf34f313c74f74b39dc3e7038c99f31821b1c8
    Size: 3.48 MB
  4. kernel-headers-2.6.18-371.3.AXS3.x86_64.rpm
    MD5: 046261cbf6a17ed8096c7b6911671446
    SHA-256: d2f59bd0b243afc0b1856a2857cf4854a787617bec646485c34de4d6f212c390
    Size: 1.49 MB
  5. kernel-xen-2.6.18-371.3.AXS3.x86_64.rpm
    MD5: 643927864759ae7182eff828e5029d01
    SHA-256: 3be43acaee7f823a0b4f5283203fa2756202eea999ebee04653e966c69e017cb
    Size: 22.76 MB
  6. kernel-xen-devel-2.6.18-371.3.AXS3.x86_64.rpm
    MD5: 87a8721478ea48010f6016d632f59c46
    SHA-256: 33762151e5c0b2ddcceadbfd28f50e2cfa3ddde5b7730de79fd551db8f26ab2e
    Size: 5.89 MB