kernel-2.6.32-71.18.1.el6
エラータID: AXSA:2011-80:02
The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-4165
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
CVE-2010-4169
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
CVE-2010-4243
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an OOM dodging issue, a related issue to CVE-2010-3858.
Update packages.
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
N/A
SRPMS
- kernel-2.6.32-71.18.1.el6.src.rpm
MD5: aa2acc38f735e5ee7654b89156c4c1ac
SHA-256: af9a2cf1efed3c177a969b19a85f4066c18e68512e5a25c6a9a65510e9268363
Size: 63.94 MB
Asianux Server 4 for x86
- kernel-2.6.32-71.18.1.el6.i686.rpm
MD5: 03d0b33b787f182aa88df2009b858959
SHA-256: ac235850e595257139691962ce769dfb9833c75fe3d26bdab6005349f99234be
Size: 20.67 MB - kernel-debug-2.6.32-71.18.1.el6.i686.rpm
MD5: 52c213a27c0851a48047c62a10ed0787
SHA-256: de0b126af27e1acd11ebf2b6d79024ea991f1c54384b7312ea17fd724ca166b4
Size: 20.51 MB - kernel-debug-devel-2.6.32-71.18.1.el6.i686.rpm
MD5: b0fd9367afb28158faa1737f4babc909
SHA-256: 2b8b10323277db59a69de87075b8ad89e4ac817f666030f4b930ba17dff5bfdb
Size: 6.45 MB - kernel-devel-2.6.32-71.18.1.el6.i686.rpm
MD5: 7d3ec39f822c7fc9ca79def4710e97c2
SHA-256: 630cc75f0932ca9cde005e6b53fcbb41e573a3dfbf5796a73c2cf526b0701b0c
Size: 6.41 MB - kernel-headers-2.6.32-71.18.1.el6.i686.rpm
MD5: 7d0a2ade9e94449635330673727c554e
SHA-256: 45b7c8a78071463d3d09f69ab58e75eef7bdcfbbe1ccd66efc64b7fb0cf1cfd8
Size: 0.96 MB - kernel-doc-2.6.32-71.18.1.el6.noarch.rpm
MD5: cb0e10249199b7b8bf33f3dd4fdd5dbe
SHA-256: ca217cb3dee6932660f9a3059bc34bb80a00c39ad877372d4e4665228f04b679
Size: 8.42 MB - kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm
MD5: efcde7b779808db4b46b0b8c7d734700
SHA-256: 89e1a9923ac94044e457efc78fb1b845d5ae65e11732158037866ef5a32b1227
Size: 1.14 MB - perf-2.6.32-71.18.1.el6.noarch.rpm
MD5: 3c051de92722ada3a09464e1c8f0253b
SHA-256: def4fe6842b685e9ed099a88ff40849dc933659a6f6d94d131df4c9ff13eafec
Size: 335.84 kB
Asianux Server 4 for x86_64
- kernel-2.6.32-71.18.1.el6.x86_64.rpm
MD5: 3e964b50de2cc872a02a465dda15f9ca
SHA-256: b8b532d174710973c607ebe1464aa735a18af85891bab4f12071881cfaa17341
Size: 21.90 MB - kernel-debug-2.6.32-71.18.1.el6.x86_64.rpm
MD5: 7ae73bbf09781cbd914a825942816be6
SHA-256: 3ff0249a79c16b6a36f8d20b054bbc95bb94d683530c3f87a573cf022d2e34c8
Size: 23.04 MB - kernel-debug-devel-2.6.32-71.18.1.el6.x86_64.rpm
MD5: ef8180598964dda92dc6750324b096db
SHA-256: ae999217d8a5032931a05a7232c75057d82fd145be0c1bdb454486ac07b1b6cd
Size: 6.49 MB - kernel-devel-2.6.32-71.18.1.el6.x86_64.rpm
MD5: 0441361fe67c61cabb2830e68a168b8f
SHA-256: 3aa4f72a95eff6fa01450f50c855f53aa1329bd1a8a8603344736607bce301b4
Size: 6.45 MB - kernel-headers-2.6.32-71.18.1.el6.x86_64.rpm
MD5: bdb0c6d792815478fe256bbc757cd94a
SHA-256: b7c3638e335190752458236e73e941be8b30070b8bdb428b305973d42eab1a33
Size: 0.96 MB - kernel-doc-2.6.32-71.18.1.el6.noarch.rpm
MD5: 749c4bf7ad6c3a1570a18b0f4ac450d5
SHA-256: 3a235ff360c162b3263c9af168a54e31df3f7c74ca6d05bc8ef859a3592e6187
Size: 8.43 MB - kernel-firmware-2.6.32-71.18.1.el6.noarch.rpm
MD5: 6c64610d465227fe992e86063910c756
SHA-256: ea284d82ce1a8fc9cf15c2caa3bffe8569d4a5e056fc8724d0988e2caa54c8c4
Size: 1.14 MB - perf-2.6.32-71.18.1.el6.noarch.rpm
MD5: 1c7b37a9d7fb43268f519c84c214d15c
SHA-256: 096da1f1db39dd4e1967a501013fa4ff4925e1dbbcd7a52dcd173e1eca27d80f
Size: 335.42 kB