kernel-2.6.32-71.14.1.el6

エラータID: AXSA:2011-57:01

リリース日: 
2011/02/24 Thursday - 13:31
題名: 
kernel-2.6.32-71.14.1.el6
影響のあるチャネル: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues:
CVE-2010-2492
Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
CVE-2010-3067
Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
CVE-2010-3078
The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
CVE-2010-3080
Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
CVE-2010-3298
The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVE-2010-3477
The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.
CVE-2010-3861
The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
CVE-2010-3865
Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
CVE-2010-3874
Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
CVE-2010-3876
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
CVE-2010-3880
net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
CVE-2010-4072
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the old shm interface.
CVE-2010-4073
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
CVE-2010-4074
The USB subsystem in the Linux kernel before 2.6.36-rc5 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to TIOCGICOUNT ioctl calls, and the (1) mos7720_ioctl function in drivers/usb/serial/mos7720.c and (2) mos7840_ioctl function in drivers/usb/serial/mos7840.c.
CVE-2010-4075
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVE-2010-4077
The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVE-2010-4079
The ivtvfb_ioctl function in drivers/media/video/ivtv/ivtvfb.c in the Linux kernel before 2.6.36-rc8 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
CVE-2010-4080
The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4081
The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4082
The viafb_ioctl_get_viafb_info function in drivers/video/via/ioctl.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a VIAFB_GET_INFO ioctl call.
CVE-2010-4083
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
CVE-2010-4158
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVE-2010-4160
Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
CVE-2010-4162
Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
CVE-2010-4163
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
CVE-2010-4242
The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
CVE-2010-4248
Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.
CVE-2010-4249
The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.
CVE-2010-4525
Linux kernel 2.6.33 and 2.6.34.y does not initialize the kvm_vcpu_events->interrupt.pad structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via unspecified vectors.
CVE-2010-4668
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.

解決策: 

Update packages.

ダウンロード: 

SRPMS
  1. kernel-2.6.32-71.14.1.el6.src.rpm
    MD5: cb63a80916c01fb281adb38ac70d1e12
    SHA-256: 4be2730f5b33680dd767db87b6b6bcd89607c38ae3ad3011b2212581c4c7d8cf
    Size: 63.92 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-71.14.1.el6.i686.rpm
    MD5: f1a6715c3775d65ef46f7ed58a31a35d
    SHA-256: 368e824f8b530dd8d2297f01219eb049dcc648f7af10509c86dd967ba70cae8f
    Size: 20.66 MB
  2. kernel-debug-2.6.32-71.14.1.el6.i686.rpm
    MD5: cf265b14d1e43bb8c765aa75961a0a98
    SHA-256: 75d3381a4bfd6fe9043ecd65879e4081174a6a37750e74f9528732c91aded054
    Size: 20.50 MB
  3. kernel-devel-2.6.32-71.14.1.el6.i686.rpm
    MD5: e65cf5542ee2a553a648ef5e3a080472
    SHA-256: 5a397642ae111b2fc22e2631776347cfc425f1e2e2e60c3fd802b9b6cea65505
    Size: 6.40 MB
  4. kernel-headers-2.6.32-71.14.1.el6.i686.rpm
    MD5: 22ca61603b03fed6627eaf099f991590
    SHA-256: cdf2bd32310f7e139f9522cbbcd87c379cfad45269695f106e6f716538e2eaad
    Size: 976.33 kB
  5. kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
    MD5: 58df8190af9f43f58c273fd5a4cac7fb
    SHA-256: 5cf272906a31a10add5d8b2797c29482c8329237b84d564b6b6e09ec9977569e
    Size: 8.42 MB
  6. kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
    MD5: f35ca451feae876a8bd70508dc1cdf8e
    SHA-256: 32db8ce73fbb5fe0b91325271a17c506dd4e593a5291473cf4918b83dcfea0f6
    Size: 1.14 MB
  7. perf-2.6.32-71.14.1.el6.noarch.rpm
    MD5: baa215ef302d9939527c99248344476c
    SHA-256: f1ae9bfee294ca9aea4fc7aa764d9ae9a9c838d0d0bb9c5622a81c0d1eb0d70a
    Size: 330.41 kB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-71.14.1.el6.x86_64.rpm
    MD5: 5bb3e5bb8ce44f3d1b6f75643be9bc72
    SHA-256: 3491e6c72663615d45d9dab2a97be8c6809515389776b7b3c535266c78ce2afd
    Size: 22.52 MB
  2. kernel-debug-2.6.32-71.14.1.el6.x86_64.rpm
    MD5: 34b72d33038bc1c47ca4eaedf4afd569
    SHA-256: bb7a8fdc6a3582e3cf9f50fade6c0a68b113d231ce4d42d0cdd958916797191b
    Size: 22.41 MB
  3. kernel-devel-2.6.32-71.14.1.el6.x86_64.rpm
    MD5: 8fc4faaa7958a60b9e0e599aca9bf27e
    SHA-256: 0497217f144fa27686747c8f9b88c7560fbcd316da9a3715e1976c98821c64fa
    Size: 6.44 MB
  4. kernel-headers-2.6.32-71.14.1.el6.x86_64.rpm
    MD5: 11badfaae742b271162f9dabfa00334b
    SHA-256: c656e909efbd8baafaad427d229bb30ee3b999d174ce4fbf2b817e22c70376f6
    Size: 975.82 kB
  5. kernel-doc-2.6.32-71.14.1.el6.noarch.rpm
    MD5: ac44a4936a9333cd445681f52ff15451
    SHA-256: 9f39c15c5f4d27bb8197f7711739d53b952b877443b8f133eb5bf3f43e3feff7
    Size: 8.42 MB
  6. kernel-firmware-2.6.32-71.14.1.el6.noarch.rpm
    MD5: c4ff61bcd7b95434cab91823eb529522
    SHA-256: 742baed6cd9dbcaab8512f5489ce40ef500077c86d0682f87aa1ca0d3d4d5cca
    Size: 1.14 MB
  7. perf-2.6.32-71.14.1.el6.noarch.rpm
    MD5: 369a3c5165da7005d42f13dade06b3d3
    SHA-256: 9c554ed8b44f9e5215bd5eb01261c01f53c29d3a5fc0e4c84aca27d4cb12769a
    Size: 329.99 kB