kernel-2.6.18-128.14.AXS3
エラータID: AXSA:2010-141:01
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security bugs fixed with this release:
CVE-2009-3612
The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.
NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
CVE-2009-3620
The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
CVE-2009-3621
net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
CVE-2009-3726
The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
CVE-2007-4567
Linux kernel 2.6.22 and earlier, and possibly other versions, does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (kernel panic) via a crafted IPv6 packet.
CVE-2009-4536
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
CVE-2009-4537
drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
CVE-2009-4538
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
CVE-2009-4036
No description available at the time of writing.
CVE-2009-2910
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
CVE-2009-3080
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
CVE-2009-3556
A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.
CVE-2009-3889
The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
CVE-2009-3939
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
CVE-2009-4020
Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
CVE-2009-4021
The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.
CVE-2009-4138
drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
CVE-2009-4141
Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.
Update packages.
The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.
The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.
drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.
N/A
SRPMS
- kernel-2.6.18-128.14.AXS3.src.rpm
MD5: 35f2ee08a2f30b53b6e68c3b7fe5409d
SHA-256: 436748494bd6ff993331bdcc1d629103d7790a6ba0b31fce3344600132b3263d
Size: 66.38 MB
Asianux Server 3 for x86
- kernel-2.6.18-128.14.AXS3.i686.rpm
MD5: 336c5ae3f4ab28b72272dd618b6feec6
SHA-256: a7329d2832f125c2faf895f2158d5be3f4a691bc4b86832c5b05336c85d9166d
Size: 15.29 MB - kernel-devel-2.6.18-128.14.AXS3.i686.rpm
MD5: 9f0cf63b86c531461e00aa4cd85e9ef6
SHA-256: 80702fc9ffb6a7ed5591a9a499847a867e76d633f9f216e39e59feff65653396
Size: 5.11 MB - kernel-PAE-2.6.18-128.14.AXS3.i686.rpm
MD5: f05011834608bd9a77e22ec2f289acde
SHA-256: 70ceeae57470de5d6affed1c89ef4191becd16e4d31e2dffdce8b9355f208cc4
Size: 15.30 MB - kernel-PAE-devel-2.6.18-128.14.AXS3.i686.rpm
MD5: 2faa641bb6f127eac7a7fcd9dad6d11e
SHA-256: 76f53be0dde208768327732d3b4afb9bcd27e842dc5688de695e1e26e71e0bb1
Size: 5.11 MB - kernel-xen-2.6.18-128.14.AXS3.i686.rpm
MD5: d4f4a9dc67466ffef0c3c8279fe255c6
SHA-256: cfe8ab91560f937a05fcf33c6a12b54d34a181d1d496a6ac3aca75d78175dd2b
Size: 16.27 MB - kernel-xen-devel-2.6.18-128.14.AXS3.i686.rpm
MD5: 77ac867d85b6637617a9a72e072774f1
SHA-256: 4c726428647766acd1da9500f282b527a25f36635e9adacbb6542aeb24a4df87
Size: 5.11 MB - kernel-doc-2.6.18-128.14.AXS3.noarch.rpm
MD5: 7a7d60bd637638e739e38fe9dd2686b2
SHA-256: b5670758dd5eaaf9ea24899e38041130db5102899ecde4b74b6ef6465e2af65a
Size: 2.92 MB - kernel-headers-2.6.18-128.14.AXS3.i386.rpm
MD5: 1d95b7c2fa1f386a002801a4764650d7
SHA-256: 421e0f36754305abaca14e3082b016393f769b5b99e512a796eaf5a429a599c4
Size: 945.29 kB
Asianux Server 3 for x86_64
- kernel-2.6.18-128.14.AXS3.x86_64.rpm
MD5: 607bb3a33f5a869a3f48c925795d53fb
SHA-256: aa00f6a8dacb7d9583a2111814ecfeb3f95763d0576fdb1105e95d0a9eebff69
Size: 16.85 MB - kernel-devel-2.6.18-128.14.AXS3.x86_64.rpm
MD5: 6ac9c959eeea1770f8873ee3770e164f
SHA-256: 855457d70cf4284b400af12689d78bb3139562c6ba202f17f9a48d2ff93b40fd
Size: 5.29 MB - kernel-headers-2.6.18-128.14.AXS3.x86_64.rpm
MD5: 416fbf33b53a1d26b7b4d12d58ca472f
SHA-256: 298b55671b596a192d6ca89e593f36adfd2cb4643d986d8feb7834d819f1b3e1
Size: 0.96 MB - kernel-xen-2.6.18-128.14.AXS3.x86_64.rpm
MD5: 46877f5e0ba9c45a62cb2ee0e391e7ae
SHA-256: f0fe0ea87d334e3c4c7328fcd67d9d2cd0bbe19a542178a7b8f6973ae5b27b74
Size: 17.50 MB - kernel-xen-devel-2.6.18-128.14.AXS3.x86_64.rpm
MD5: ed41cb6bcd8331d18c41d9545ab42d8a
SHA-256: d78dd6eda0ea76ac602d4f34062b586e4c3bb21bfd87fab9371642db34603bb1
Size: 5.30 MB - kernel-doc-2.6.18-128.14.AXS3.noarch.rpm
MD5: c587cd1cd6769f8c53832a289a4a0950
SHA-256: bd6e2783454b94f6ddd05184ca6f4c8d04550d61097b380a783fb0295afc089a
Size: 2.92 MB