kernel-2.6.32-220.13.1.el6
エラータID: AXSA:2012-546:04
リリース日:
2012/05/10 Thursday - 21:17
題名:
kernel-2.6.32-220.13.1.el6
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- ブロックレイヤI/Oコンテキストの処理に参照数カウント漏れが検出されました。権限のないローカルユーザがサービス拒否を引き起こす危険性があります。(CVE-2012-0879)
- cifs_lookupの実装にセキュリティ上の欠陥が検出されました。lookup中のPOSIX openはレギュラーファイルに対してのみサポートされるべきでした。非レギュラーファイル(FIFOなど)がlookup上でopenされるとサービス拒否を引き起こす危険性があります。(CVE-2012-1090)
- register set common infrastructureの実装にセキュリティ上の欠陥が検出されました。要求されたgetとsetハンドラが初期化されているかどうかをチェックしていませんでした。ptraceシステムコールを使ってregister set操作を行うことで、権限のないローカルユーザがサービス拒否を引き起こす危険性があります。(CVE-2012-1097)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2012-0879
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-2.6.32-220.13.1.el6.src.rpm
MD5: e5ffb9285936f52054982165c905ded0
SHA-256: 8ea30bd0c2ec552f009670dcbf779758654ee6daf210e1efc1f96b4198403308
Size: 74.66 MB
Asianux Server 4 for x86
- kernel-2.6.32-220.13.1.el6.i686.rpm
MD5: 344738d9df67ce4d48cb99e77c851860
SHA-256: 2771fe514f9de4b68599e2868445c4bbfb49bd1e85f1327dbb3e792e06e632f1
Size: 22.33 MB - kernel-debug-2.6.32-220.13.1.el6.i686.rpm
MD5: d5dc7fd95efc111b827b7996540325b7
SHA-256: 093e2d16fdcb4ae95bd79aa9d6ff8ed501e022c53def0dbb49a60ecdc7b2846b
Size: 22.81 MB - kernel-debug-devel-2.6.32-220.13.1.el6.i686.rpm
MD5: 8c408104fb37554fbb9d46f7ecca9cc9
SHA-256: e7eb3347baddbe63a2eab12c15df64adb47fa056b5411cac65b5adaff85753cb
Size: 7.29 MB - kernel-devel-2.6.32-220.13.1.el6.i686.rpm
MD5: dbf994d10007e05dfa388fe2ef9017b4
SHA-256: 0adb055874cdd2bcdf7b2fb87da774a7f43ccd1bbbddb107da9b5ee9a7267baa
Size: 7.24 MB - kernel-doc-2.6.32-220.13.1.el6.noarch.rpm
MD5: b59f343b739f789f9d438db773440246
SHA-256: 37572388d4897fed915ae39f7b5073fc02c587388e9d0bcc27cbbb8238d53f9a
Size: 9.15 MB - kernel-firmware-2.6.32-220.13.1.el6.noarch.rpm
MD5: 9d930d255c3d753c27763e239687efb5
SHA-256: 1bfe2abb26b57ec3081f643cd2d8b0e6120897c77356fc1399db3049446953f9
Size: 6.25 MB - kernel-headers-2.6.32-220.13.1.el6.i686.rpm
MD5: fb906a90ee1cbf59ed68ac1b281b529a
SHA-256: 8df56170a95dd9ec734d4749f03572821be69626d8ee1f8530eadf1f979d246c
Size: 1.62 MB - perf-2.6.32-220.13.1.el6.i686.rpm
MD5: 1dad041d1bec63c90a9e893c06c8fced
SHA-256: 3ea3e0f2049221c8e141250a97ab031a63dfc8af311baad9e49f661f367c4584
Size: 1.27 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-220.13.1.el6.x86_64.rpm
MD5: 93431a87f443272518c9ad5156f5300f
SHA-256: 493e79d84e54c4cc12d8be3d7ecb3446e4e4e23b9ba3d19708fcb3cfdaf8eb07
Size: 24.29 MB - kernel-debug-2.6.32-220.13.1.el6.x86_64.rpm
MD5: 698677a4d9bb91b89fa8275e1d4b3d57
SHA-256: 3d421553960bf03282ac2cd676ea54ee3c699f648d973181b57adf5587eae4cb
Size: 24.85 MB - kernel-debug-devel-2.6.32-220.13.1.el6.x86_64.rpm
MD5: bdc7afecf7e594f2acc2e8d6d5969c55
SHA-256: 7268b52f8b9229b6c62f100f486b952be7e997beb19859683276b3697d95ad83
Size: 7.33 MB - kernel-devel-2.6.32-220.13.1.el6.x86_64.rpm
MD5: 5c21f529e112b052b6d927a0e3027529
SHA-256: b96e8655bcef4348ccdabecdcb229fd50138acce5c12d86da705fe497a1b85ca
Size: 7.28 MB - kernel-doc-2.6.32-220.13.1.el6.noarch.rpm
MD5: 3a84567e74f5bb7f85989a730f877292
SHA-256: 3e8d364a2a208ef6350c3d1f08ab3603d28087a9337092d7d82a02a679f8049b
Size: 9.15 MB - kernel-firmware-2.6.32-220.13.1.el6.noarch.rpm
MD5: 9048a96d1eeec250b7983d8ed0b25b93
SHA-256: 774bcc08c9bd737ac75d1b7cc621d3c18e120e73366129ac49d4b42a133bcda8
Size: 6.25 MB - kernel-headers-2.6.32-220.13.1.el6.x86_64.rpm
MD5: bd99a1c778e8957588befef894e65103
SHA-256: 1c723d50445c3bf0b1f825d7b16f289eaa9500e27de723f70fe942bc431ff987
Size: 1.62 MB - perf-2.6.32-220.13.1.el6.x86_64.rpm
MD5: 25e90f4ac61a548e8869f93a195370b3
SHA-256: e02c7408c8ba8c040bd4ca9ffd6d36bee1d9617139fb29d1738a2ca83afc604c
Size: 1.28 MB