kernel-2.6.18-194.7.AXS3

エラータID: AXSA:2010-464:16

Release date: 
Tuesday, October 19, 2010 - 13:54
Subject: 
kernel-2.6.18-194.7.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-1083
The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).
CVE-2010-2492
Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
CVE-2010-2798
The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
CVE-2010-2938
arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware support for these fields, which allows local users to cause a denial of service (host OS crash) by requesting a VMCS dump for a fully virtualized Xen guest.
CVE-2010-2942
The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c
CVE-2010-2943
The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.
CVE-2010-3015
Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.18-194.7.AXS3.src.rpm
    MD5: 9b21144d101171287ae137ce4aa881fb
    SHA-256: 2f1fc87c517fd826b33299e4d8871d253b4a2ba5345a71b2dd78e437ddff78d9
    Size: 80.47 MB

Asianux Server 3 for x86
  1. kernel-2.6.18-194.7.AXS3.i686.rpm
    MD5: 39b8ee676fc908b1f2d493878c3af6d6
    SHA-256: 601bf0ec03d255f07daf7713cf40bc1ce191614d4152733c3c97fd48a2524a1c
    Size: 17.23 MB
  2. kernel-devel-2.6.18-194.7.AXS3.i686.rpm
    MD5: 48ab1d098deb1e3eadcee576f06dce6c
    SHA-256: 630a5d7e419a46f8f49a69be20dd9ee171f1663c945f6e89374fb0df512e23bb
    Size: 5.59 MB
  3. kernel-PAE-2.6.18-194.7.AXS3.i686.rpm
    MD5: 41b0d5d2e4ea02c1df6aecd5a854b57d
    SHA-256: d5afdff0f738cb4ed55af8227c9b90e9bd28df5a8290f00e30a2f7f29d3bece4
    Size: 17.25 MB
  4. kernel-PAE-devel-2.6.18-194.7.AXS3.i686.rpm
    MD5: 3fc0582e502f2ae8aa72a4563aaa9ae3
    SHA-256: 816cdf46bed49fa3018cbf0374cee6ce8c9dccbd7368c6845fd187df04b0141d
    Size: 5.59 MB
  5. kernel-xen-2.6.18-194.7.AXS3.i686.rpm
    MD5: 2bf65d4ffcc62e94861b83c6b3b1637b
    SHA-256: 29e34125eb53931e18597bcc66130e1992f54f23e84b0110eae7bbf582ace497
    Size: 18.34 MB
  6. kernel-xen-devel-2.6.18-194.7.AXS3.i686.rpm
    MD5: ccc2b1632a5d2456e17561bb56e6d57e
    SHA-256: f17a9cdb22dec2047a7cd221b398349e8a3bfc2db115ec0d011135945102f748
    Size: 5.59 MB
  7. kernel-doc-2.6.18-194.7.AXS3.noarch.rpm
    MD5: 98e6a6fc6704b2300d6136baca5c8916
    SHA-256: f11cf6907c6bc82702d5a29f2ad0a403c0f0f4c7eee537469ab7f9410b2b29e7
    Size: 3.06 MB
  8. kernel-headers-2.6.18-194.7.AXS3.i386.rpm
    MD5: 30d8bc9e4339cc2bf5b8676b2ce06313
    SHA-256: 58dc52e1cc376137a74c8dae391a0e85f2a8ea8c0db05dbce9e79a103374e831
    Size: 1.06 MB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-194.7.AXS3.x86_64.rpm
    MD5: 2947901654ef5c21a1e6ea2e86c87474
    SHA-256: 91ec6b2a6d9467f98bb2450966c2474c1d1998b80d169e09d24fa97e02a1d963
    Size: 19.16 MB
  2. kernel-devel-2.6.18-194.7.AXS3.x86_64.rpm
    MD5: b5555517823d21700b8fc0793bbc6584
    SHA-256: 4d0c36b1b33bab90ed289be7eb1ca11b6a49d2c90e8b3158fe87262747020a43
    Size: 5.59 MB
  3. kernel-headers-2.6.18-194.7.AXS3.x86_64.rpm
    MD5: a03863d0a2660830ae4dd065c7359c4d
    SHA-256: d42eff28f2a2ff9fe46334bccc9ee453d9df31555f7cd822da1c002d6e8f4e0c
    Size: 1.10 MB
  4. kernel-xen-2.6.18-194.7.AXS3.x86_64.rpm
    MD5: ee8b70faac9475ba3342e1bdb60a3fc3
    SHA-256: 278c5041625430d168628ad1363d042b241169c517b66dc29df7aa2ad0701138
    Size: 20.06 MB
  5. kernel-xen-devel-2.6.18-194.7.AXS3.x86_64.rpm
    MD5: 5984fdf49da5478177ab34ca9a704fb7
    SHA-256: 2701ef6c373dde2b77fc0bce4d16ee0272fb8f05146bf21456aefe7c07145476
    Size: 5.59 MB
  6. kernel-doc-2.6.18-194.7.AXS3.noarch.rpm
    MD5: c6afe65227450e5fa31207bcac2034f4
    SHA-256: 738a92dfe5b54ad845169884dcfa60343d4acf9d1f0f35fb98453f113e05b878
    Size: 3.06 MB