kernel-2.6.18-194.3.AXS3
エラータID: AXSA:2010-377:12
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-0291
The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the 'do_mremap() mess' or 'mremap/mmap mess.'
CVE-2010-0622
The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.
CVE-2010-1087
The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.
CVE-2010-1088
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount 'symlinks,' which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
CVE-2010-1173
The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
CVE-2010-1187
The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
CVE-2010-1436
gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
CVE-2010-1437
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
CVE-2010-1641
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
Fixed bugs:
acpi
- warn on hot-add of memory exceeding 4G boundary
- fix WARN on unregister in power meter driver
block
- cfq-iosched: fix IOPRIO_CLASS_IDLE accounting
- cfq-iosched: async queue allocation per priority
- cfq-iosched: fix async queue behaviour
- cfq-iosched: propagate down request sync flag
- introduce the rq_is_sync macro
fs
- remove unneccessary f_ep_lock from fasync_helper
misc
- add atomic64_cmpxcgh to x86_64 include files
mm
- fix hugepage corruption using vm.drop_caches
- clear page errors when issuing a fresh read of page
net
- e1000: fix WoL init when WoL disabled in EEPROM
- tg3: fix INTx fallback when MSI fails
- sched: fix SFQ qdisc crash w/limit of 2 packets
- bonding: fix broken multicast with round-robin mode
- cnic: Fix crash during bnx2x MTU change
- bxn2x: add dynamic lro disable support
- sctp: file must be valid before setting timeout
- e1000/e1000e: implement simple interrupt moderation
- neigh: fix state transitions via Netlink request
- tg3: fix panic in tg3_interrupt
- cnic: fix bnx2x panic w/multiple interfaces enabled
nfs
- revert retcode check in nfs_revalidate_mapping()
- don't unhash dentry in nfs_lookup_revalidate
virt
- don't compute pvclock adjustments if we trust tsc
- add a global synchronization point for pvclock
- enable pvclock flags in vcpu_time_info structure
virtio
- fix GFP flags passed by virtio balloon driver
x86
- grab atomic64 types from upstream
x86_64
- fix time drift due to faulty lost tick tracking
xen
- set hypervisor present CPUID bit
Update packages.
The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess."
The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.
The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference.
gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
N/A
SRPMS
- kernel-2.6.18-194.3.AXS3.src.rpm
MD5: 7138b93175ada3292805173812f83252
SHA-256: f4bb16ada746cd7d0b876601d206fa78d5d7efc76fba9bb7ffb84164817096dd
Size: 79.85 MB
Asianux Server 3 for x86
- kernel-2.6.18-194.3.AXS3.i686.rpm
MD5: 92e4e408bf11864b76ea08f073bc8fef
SHA-256: b407659da2e601736b6efbdfbf6393bdf3cc3d3de91331def098854e5bb604e0
Size: 17.20 MB - kernel-devel-2.6.18-194.3.AXS3.i686.rpm
MD5: 689b11b01c3f7ac182bb2757098236fd
SHA-256: 167803ff53c79ed4fb6bdef0f3fb0683985d30613600e57605a4855babad3699
Size: 5.57 MB - kernel-PAE-2.6.18-194.3.AXS3.i686.rpm
MD5: 3a24b358ac3a9a80ee9f641da9047097
SHA-256: 570e62d347c7c361e22bfa203c939eac137914d0a0f44866a47738c0390ae102
Size: 17.22 MB - kernel-PAE-devel-2.6.18-194.3.AXS3.i686.rpm
MD5: 5d82ade8aaa86204b4a8910e0acb59d0
SHA-256: 153933e29811ff0d8a68bea4379e4530fc8d9e1dcab41d9129fca6a7a0ddc199
Size: 5.58 MB - kernel-xen-2.6.18-194.3.AXS3.i686.rpm
MD5: c46ce828fcafab01070908a9217b668b
SHA-256: 8823f2c9a12dec2309a77a8fb8447800960485fb28d053cc862215e7b0b23469
Size: 18.32 MB - kernel-xen-devel-2.6.18-194.3.AXS3.i686.rpm
MD5: ce43350c2386077964c0df001fced47a
SHA-256: 06ecacd20b19158cbac4d3f60733f724be391647c03ef0399642a2e56385895b
Size: 5.58 MB - kernel-doc-2.6.18-194.3.AXS3.noarch.rpm
MD5: 0ce5f725d15001468d9b05fc96cd7f34
SHA-256: 509381fa9d829a1c00ac8f2d8eb805c6c375a544d25b84790c1d2e812b3759b2
Size: 3.06 MB - kernel-headers-2.6.18-194.3.AXS3.i386.rpm
MD5: 7a2bd00ea834e4b3e1d3dfd1b349e6cd
SHA-256: 927622f73dec0ea06261cb6b9841ff154fb7723a7fc0c7a0c13f8411abb02e2e
Size: 1.06 MB
Asianux Server 3 for x86_64
- kernel-2.6.18-194.3.AXS3.x86_64.rpm
MD5: 1394ffc36ce377ded1f1cc1702b17f73
SHA-256: 7234742e8f8f30347d6a8b61818a25d0b23a419e9544bf8acdb8fc9d33f8dd74
Size: 19.14 MB - kernel-devel-2.6.18-194.3.AXS3.x86_64.rpm
MD5: 88601ace8670f989702f9b295e251a46
SHA-256: 9d5652219cce5fa3fce8a216ddccdb56e6950552e69e1518e473343dec39044e
Size: 5.58 MB - kernel-headers-2.6.18-194.3.AXS3.x86_64.rpm
MD5: 1f1b8eeb0c41bc523b9be085bf8070ef
SHA-256: a8bf4ebf65f3512e6fc81d798d23bf1de54f3a75133e9c3554b326f6f657c744
Size: 1.09 MB - kernel-xen-2.6.18-194.3.AXS3.x86_64.rpm
MD5: b5c1d1463b4f75a791475a81af0b3c55
SHA-256: 5e5da0ced4877f67e4b53ec31843f05668d6a41a48a4b8442dfd4fb057c8c126
Size: 20.04 MB - kernel-xen-devel-2.6.18-194.3.AXS3.x86_64.rpm
MD5: 9fbd095d4d3e45d047fd1b826b506b14
SHA-256: 8b8e255326fcc57c77d6ea0c0b40e6c9a2ddfa5ec2f78e1d77df005009c2252f
Size: 5.58 MB - kernel-doc-2.6.18-194.3.AXS3.noarch.rpm
MD5: 678be47f1517fdf152cf7aa7a5134c51
SHA-256: a61995f290aaa9d13bfacad3940cde656334af156455c2c7b4d3674c7c9ae1a4
Size: 3.06 MB