kernel-2.6.32-642.el6

エラータID: AXSA:2016-511:01

Release date: 
Tuesday, June 21, 2016 - 11:25
Subject: 
kernel-2.6.32-642.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2010-5313
Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38
allows L2 guest OS users to cause a denial of service (L1 guest OS
crash) via a crafted instruction that triggers an L2 emulation failure
report, a similar issue to CVE-2014-7842.
CVE-2013-4312
The Linux kernel before 4.4.1 allows local users to bypass
file-descriptor limits and cause a denial of service (memory
consumption) by sending each descriptor over a UNIX socket before
closing it, related to net/unix/af_unix.c and net/unix/garbage.c.
CVE-2014-7842
Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4
allows guest OS users to cause a denial of service (guest OS crash)
via a crafted application that performs an MMIO transaction or a PIO
transaction to trigger a guest userspace emulation error report, a
similar issue to CVE-2010-5313.
CVE-2014-8134
The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux
kernel through 3.18 uses an improper paravirt_enabled setting for KVM
guest kernels, which makes it easier for guest OS users to bypass the
ASLR protection mechanism via a crafted application that reads a
16-bit value.
CVE-2015-5156
The virtnet_probe function in drivers/net/virtio_net.c in the Linux
kernel before 4.2 attempts to support a FRAGLIST feature without
proper memory allocation, which allows guest OS users to cause a
denial of service (buffer overflow and memory corruption) via a
crafted sequence of fragmented packets.
CVE-2015-7509
fs/ext4/namei.c in the Linux kernel before 3.7 allows physically
proximate attackers to cause a denial of service (system crash) via a
crafted no-journal filesystem, a related issue to CVE-2013-2015.
CVE-2015-8215
net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0
does not validate attempted changes to the MTU value, which allows
context-dependent attackers to cause a denial of service (packet loss)
via a value that is (1) smaller than the minimum compliant value or
(2) larger than the MTU of an interface, as demonstrated by a Router
Advertisement (RA) message that is not validated by a daemon, a
different vulnerability than CVE-2015-0272. NOTE: the scope of
CVE-2015-0272 is limited to the NetworkManager product.
CVE-2015-8324
The ext4 implementation in the Linux kernel before 2.6.34 does not
properly track the initialization of certain data structures, which
allows physically proximate attackers to cause a denial of service
(NULL pointer dereference and panic) via a crafted USB device, related
to the ext4_fill_super function.
CVE-2015-8543
The networking implementation in the Linux kernel through 4.3.3, as
used in Android and other products, does not validate protocol
identifiers for certain protocol families, which allows local users to
cause a denial of service (NULL function pointer dereference and
system crash) or possibly gain privileges by leveraging CLONE_NEWUSER
support to execute a crafted SOCK_RAW application.

Additional Changes:

* Please refer to Asianux Server 4 SP6 Release notes.

Solution: 

Update package.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-642.el6.src.rpm
    MD5: 350e913d4ee82a9c24f0e1ec17957bac
    SHA-256: 3ad1d4520434c05f9494f82f424a75c3942c94a89392d1801d71860de2676222
    Size: 125.81 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-642.el6.i686.rpm
    MD5: 98b6b5025fb018a7a491f8e2b0d96ff9
    SHA-256: 3cc1105059073dfd7a93c644f8a595131dce42cf9f57f9196661126adac42382
    Size: 29.54 MB
  2. kernel-abi-whitelists-2.6.32-642.el6.noarch.rpm
    MD5: ec46e16e59ae1b8b968d9b822baa1c5d
    SHA-256: 4914818f99605fb084809be0a639883b8d75666db71ed1995a409fb191605529
    Size: 3.62 MB
  3. kernel-debug-2.6.32-642.el6.i686.rpm
    MD5: a20d82e36430e63b242fce99c0a1bdf7
    SHA-256: 682b1d2bc219ab47cea613e9c6943fa19ec4aa99caab1f646ae3241adef27d97
    Size: 30.32 MB
  4. kernel-debug-devel-2.6.32-642.el6.i686.rpm
    MD5: d995bccb2f454fbb64baa0c6c8a87b5f
    SHA-256: d59192405f74ae2520d650f584e32f79d398c67fc8edd6a419a08f866126431a
    Size: 10.56 MB
  5. kernel-devel-2.6.32-642.el6.i686.rpm
    MD5: 706913e847207693b5e047dca05bd981
    SHA-256: 383a6a3946d4952a027b55b6ecdc86c9ec8cdd4ec52eb59d64d67f2528cd5aeb
    Size: 10.52 MB
  6. kernel-doc-2.6.32-642.el6.noarch.rpm
    MD5: 0257467c5c8ca156be7f0d911f9819cf
    SHA-256: 97ffaf1c6b8517de573a2ab652aad2870322d8587030e89fcfccf7511c5bd248
    Size: 12.19 MB
  7. kernel-firmware-2.6.32-642.el6.noarch.rpm
    MD5: e99945f8ff3c23f4fe6f71c6d6307617
    SHA-256: 8ad093b0e8c2782ac5ef29b11f12fdb144f841475ffe47c00f619b6ee3c0a6e6
    Size: 28.06 MB
  8. kernel-headers-2.6.32-642.el6.i686.rpm
    MD5: bdfc6c0f8a5cd8c5ea775d56bc29f239
    SHA-256: 325994abbbc283bd2ff82349377091a01d09c5484f0b92f98dd14af03c760cb2
    Size: 4.35 MB
  9. perf-2.6.32-642.el6.i686.rpm
    MD5: 06559b4dcda106cb48d7d0e339e1dc48
    SHA-256: a992f6d52cbaa0aff372f4e7cdba83edf7b347cdf710f3ab9a021312d03e9273
    Size: 4.58 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-642.el6.x86_64.rpm
    MD5: aaffcb8334201ea38c705f91284bf199
    SHA-256: b526a10121e28bbcc7aed2b0d223de2f637b7009fbc7f8f81419b710653b4672
    Size: 31.84 MB
  2. kernel-abi-whitelists-2.6.32-642.el6.noarch.rpm
    MD5: 9494c2a792de41b75129807e61895d46
    SHA-256: 3061fac117c16f7faced936060ec2ec224a702adf968864c68d34525b8ba52d9
    Size: 3.62 MB
  3. kernel-debug-2.6.32-642.el6.x86_64.rpm
    MD5: 485e6bae1ead6c22856ebcca61845366
    SHA-256: 32480cb226bd2b779b6ac2802c6ae92b777ffea09a32d990f90a67bd044f0ea5
    Size: 32.72 MB
  4. kernel-debug-devel-2.6.32-642.el6.x86_64.rpm
    MD5: 2b9ca2be07cc5dcbe183f2798732e956
    SHA-256: a4a9f987886e99dbdc334bd7dc52f4f578d08a641f437d03c50dbd9f1b8ec524
    Size: 10.61 MB
  5. kernel-devel-2.6.32-642.el6.x86_64.rpm
    MD5: 0e38d379d71520553a842682feed7753
    SHA-256: 29dcd2bcc6341b72256a827591479d6482761c00b2792e51ae27666a093dd3a2
    Size: 10.57 MB
  6. kernel-doc-2.6.32-642.el6.noarch.rpm
    MD5: ebd5ecf5892187dc2868d1f131c3fbdb
    SHA-256: e4b1add4aca61e65be27d0d5386fafd65e9192946c417eddee59419263fc5191
    Size: 12.19 MB
  7. kernel-firmware-2.6.32-642.el6.noarch.rpm
    MD5: 08d57df2c70ffc21db3a8489be2082d8
    SHA-256: b78967d26fe7eb399e49f646343af04d21f30fde4fea40aa16fbfaf46a18d0c8
    Size: 28.06 MB
  8. kernel-headers-2.6.32-642.el6.x86_64.rpm
    MD5: 978c85cc1e12002f6747f87ca70caf6c
    SHA-256: 38943e9c79b5063aca94a9f7fc23eb693e16db13703042cb33722b7afdbb6f0c
    Size: 4.35 MB
  9. perf-2.6.32-642.el6.x86_64.rpm
    MD5: d9accf3301a2860ea08d049044b3a492
    SHA-256: 0a65dc98952649d8f21c44f683d4ef94daf73663b30d8d23457e295ad3f86af0
    Size: 4.55 MB