kernel-2.6.32-573.12.1.el6

エラータID: AXSA:2016-018:01

Release date: 
Monday, January 11, 2016 - 10:09
Subject: 
kernel-2.6.32-573.12.1.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Security issues fixed with this release:

CVE-2015-2925
The prepend_path function in fs/dcache.c in the Linux kernel before
4.2.4 does not properly handle rename actions inside a bind mount,
which allows local users to bypass an intended container protection
mechanism by renaming a directory, related to a "double-chroot
attack."
CVE-2015-5307
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service
(host OS panic or hang) by triggering many #AC (aka Alignment Check)
exceptions, related to svm.c and vmx.c.
CVE-2015-7613
Race condition in the IPC object implementation in the Linux kernel
through 4.2.3 allows local users to gain privileges by triggering an
ipc_addid call that leads to uid and gid comparisons against
uninitialized data, related to msg.c, shm.c, and util.c.
CVE-2015-7872
The key_gc_unused_keys function in security/keys/gc.c in the Linux
kernel through 4.2.6 allows local users to cause a denial of service
(OOPS) via crafted keyctl commands.
CVE-2015-8104
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service
(host OS panic or hang) by triggering many #DB (aka Debug) exceptions,
related to svm.c.

Fixed bugs:

* Previously, Human Interface Device (HID) ran a report on an unaligned buffer, which could cause a page fault interrupt and an oops when the end of the report was read. This update fixes this bug by padding the end of the report with extra bytes, so the reading of the report never crosses a page boundary. As a result, a page fault and subsequent oops no longer occur.
* The NFS client was previously failing to detect a directory loop for some NFS server directory structures. This failure could cause NFS inodes to remain referenced after attempting to unmount the file system, leading to a kernel crash. Loop checks have been added to VFS, which effectively prevents this problem from occurring.
* Due to a race whereby the nfs_wb_pages_cancel() and nfs_commit_release_pages() calls both removed a request from the nfs_inode struct type, the kernel panicked with negative nfs_inode.npages count. The provided upstream patch performs the required serialization by holding the inode i_lock over the check of PagePrivate and locking the request, thus preventing the race and kernel panic from occurring.
* Due to incorrect URB_ISO_ASAP semantics, playing an audio file using a USB sound card could previously fail for some hardware configurations. This update fixes the bug, and playing audio from a USB sound card now works as expected.
* Inside hugetlb, region data structures were protected by a combination of a memory map semaphore and a single hugetlb instance mutex. However, a page-fault scalability improvement backported to the kernel on previous releases removed the single hugetlb instance mutex and introduced a new mutex table, making the locking combination insufficient, leading to possible race windows that could cause corruption and undefined behavior. This update fixes the problem by introducing a required spinlock to the region tracking functions for proper serialization. The problem only affects software using huge pages through hugetlb interface.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-573.12.1.el6.src.rpm
    MD5: 0d7b2872a9d0705a2258cb1617ecf50d
    SHA-256: 0499f1cdf94275c775062369b66cce3cd5bbaeb906e1c99cd0c2ec7693a96358
    Size: 104.47 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-573.12.1.el6.i686.rpm
    MD5: 11957993ed54e0a9153b37c424257d1f
    SHA-256: 2c818633ee1f0803a1af4fe814a3b2461ca4333cebd5125b1066096a3aee78d6
    Size: 28.08 MB
  2. kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
    MD5: d379e07a9f0687a30c61597aa28b8448
    SHA-256: 043d193bdc7f349bdef5ffd3f9350f0be6c02a57a44771b577e826c85804f74e
    Size: 3.19 MB
  3. kernel-debug-2.6.32-573.12.1.el6.i686.rpm
    MD5: 6e7b267728ee0a48704badc8c54f3391
    SHA-256: 42f7b2f4dbb67eb1d70aa8aed06413cae72a1ed96d42fe58b4dcf2f239522d6b
    Size: 28.71 MB
  4. kernel-debug-devel-2.6.32-573.12.1.el6.i686.rpm
    MD5: c1ccf5147f20ca713cedb423b9945986
    SHA-256: f309b8b1b60a21237eee1380baafdcab69c91b7ffe926a73eb4404858fffd50e
    Size: 10.00 MB
  5. kernel-devel-2.6.32-573.12.1.el6.i686.rpm
    MD5: 6ea188d5ee82f511cea6542a4aa8b046
    SHA-256: 4e3e57338c36b22106807526c1f2d8e91d428857824e9bd7a7352ba4e494c8f1
    Size: 9.96 MB
  6. kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
    MD5: f9cfff242297e3f6f76c66cefbce7a82
    SHA-256: da9163f7f0a3e343ba09ef068e8102bc50220323491ba8b5dd995e05a58ddae5
    Size: 11.73 MB
  7. kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
    MD5: 8847430405a33e93ec041553a2471f57
    SHA-256: 8edd389e5fbfd297fdf2809cc438c74f3cf6424877b8f4c54a5b6b6b0b4c393e
    Size: 17.97 MB
  8. kernel-headers-2.6.32-573.12.1.el6.i686.rpm
    MD5: 3c43eabae3f49b808d79f2e6a6497bfe
    SHA-256: b42ddc96a557fe340f24004ceb807b4d4354f09d3a8d97e21944deaa379b8874
    Size: 3.91 MB
  9. perf-2.6.32-573.12.1.el6.i686.rpm
    MD5: 171a2ca3e2938dd48c24ccc7b34ccd41
    SHA-256: b5155b6d4c32f9e8c2b77e25db5ccb325321c3fc7552871347b67b07774492f5
    Size: 4.07 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: 1bac22ddca409bd48141b262b9b71286
    SHA-256: 55b3e8e7c1834d2dd8e5883a3704ffd94aad8446ae6aff34c86eea7729a2dbda
    Size: 30.30 MB
  2. kernel-abi-whitelists-2.6.32-573.12.1.el6.noarch.rpm
    MD5: 0fa38e9a563f26f7dc9cf051911f4f5e
    SHA-256: 5d551a557806c4ca80ca58db45e4fe3df31306a8cc160d1c41a85bce32f62dca
    Size: 3.19 MB
  3. kernel-debug-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: ae75c9feb44995ab7b5a33efa7687e9a
    SHA-256: ff8d4953787b37619a82fec12ada57f50f3c2162cb8e581826dd0f7684a03e6a
    Size: 31.01 MB
  4. kernel-debug-devel-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: 55e4db0c3625ddd03f5d725282a601cc
    SHA-256: e0338d10e3079d4f69ff6a2419d2461b421956898935da687c7ca65ea04d6e2f
    Size: 10.05 MB
  5. kernel-devel-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: beeabddfc70998e921a015b7d661c5f2
    SHA-256: 04b2d94b110e9375ca7ed8e76e1434d6f78dbc30eab6be97f224abcd3a7f6af3
    Size: 10.01 MB
  6. kernel-doc-2.6.32-573.12.1.el6.noarch.rpm
    MD5: 26e36b7fc0e7a58121b15971b4526bc9
    SHA-256: 9177ed215cfe0ab7586a4c7345667b28aa9cc8ca7848b51ac0d49cf76d625960
    Size: 11.73 MB
  7. kernel-firmware-2.6.32-573.12.1.el6.noarch.rpm
    MD5: 4751268483acefb2f116bdb0a539efdd
    SHA-256: f27baf9d6eb043a13d20568057a630e159ca43ccf15c04f3e78e2d4c2b942339
    Size: 17.97 MB
  8. kernel-headers-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: c780b833e2ae1e62cb139b14bb0ca0f4
    SHA-256: a9ef98336304fb755417a3153a282ecf03f0e7cd15678c01cdf06521fdab4e0a
    Size: 3.91 MB
  9. perf-2.6.32-573.12.1.el6.x86_64.rpm
    MD5: 68c3866587dd430a1172a023bf5bf925
    SHA-256: 942ddf5140fede4c855d707a92e05da9f9156c58cf52091de3e1de512a72b5a3
    Size: 4.05 MB