kernel-2.6.18-194.11.AXS3
エラータID: AXSA:2011-143:02
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-3296
The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
CVE-2010-3877
The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVE-2010-4072
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the 'old shm interface.'
CVE-2010-4073
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
CVE-2010-4075
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVE-2010-4080
The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4081
The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4158
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVE-2010-4238
The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Asianux Server 3 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information.
CVE-2010-4243
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an OOM dodging issue, a related issue to CVE-2010-3858.
CVE-2010-4255
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.
CVE-2010-4343
drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
CVE-2010-4526
Race condition in the Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
CVE-2010-4249
The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
CVE-2010-4251
CVE-2010-4655
No information available at the time of writing, please refer to the CVE links below.
Fixed bugs:
- An off-by-one error would make gfs2_grow fail to take the very last 'rgrp' parameter into account when adding up the new free space. This has been fixed and the GFS2 kernel properly counts all the new resource groups and fixes the 'statfs' file correctly.
- Previously, a multi-threaded application internally invoking popen(3) could cause a thread stall by FILE lock corruption. The lock corruption was due to a race condition in the Copy on Write (COW) logic. This has been fixed.
- If an error occurred during I/O, the SCSI driver reset the 'megaraid_sas' controller to restore it to normal state. However, on Asianux Server 3, the waiting time to allow a full reset completion for the 'megaraid_sas' controller was too short, causing the driver to incorrectly recognize the the controller as stalled, and in turn the system would stall too. This has been fixed by giving more time to the controller to restart.
Update packages.
The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information.
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.
drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
N/A
SRPMS
- kernel-2.6.18-194.11.AXS3.src.rpm
MD5: 72a0dd23c4d8d49f3dfae017642a758c
SHA-256: 75dca210a09b4dd9d573c3dc947265a79661cb8896deb76efb19e362bb09ce48
Size: 80.72 MB
Asianux Server 3 for x86
- kernel-2.6.18-194.11.AXS3.i686.rpm
MD5: 0819b25fb4d2845e0e6b360bf490beda
SHA-256: f7925c98ed693a4dd7eb69ac8727b8d0e25d10bdbccea1c2d64f37d81da5dc69
Size: 17.25 MB - kernel-devel-2.6.18-194.11.AXS3.i686.rpm
MD5: 0643dcc98fc67c77d5a1f02e35d08844
SHA-256: 31a3524e7ebb37a621a138d6257ca789100f082f6a4069a0edb57b468c7e6bb9
Size: 5.60 MB - kernel-PAE-2.6.18-194.11.AXS3.i686.rpm
MD5: 32fa07ec426273fd2b4fe8c66ec1eeb7
SHA-256: 7dc9ab1c7583aef3f0a86d8b59178c17a40d7a29831c19294c77c1c4e3dc1aeb
Size: 17.27 MB - kernel-PAE-devel-2.6.18-194.11.AXS3.i686.rpm
MD5: f3c98405bbc27e66554e8774a4aeaa56
SHA-256: dfe03c5bb4456424adbd65124d49e3687fad44de5e7a79e616a8b9904e896546
Size: 5.61 MB - kernel-xen-2.6.18-194.11.AXS3.i686.rpm
MD5: 0f90b93dbbb396294f83b5f45009b429
SHA-256: 682688edded00f8432a5584e3f21b4c140ed604affd09c91a717d7d7ed78000b
Size: 18.37 MB - kernel-xen-devel-2.6.18-194.11.AXS3.i686.rpm
MD5: 9ea5cc6ca8631bddc323aef71968ccba
SHA-256: 3997cefd1eaf20990ff153c1adba948b78dc6210032456bbcd08a946cdd5e099
Size: 5.61 MB - kernel-doc-2.6.18-194.11.AXS3.noarch.rpm
MD5: 45ef65ee2c1cdb60e48d754a3ee0767c
SHA-256: d762c61963b924dd8c21c2cc5efec5acfb2b9859969480124f2a89db82e91304
Size: 3.08 MB - kernel-headers-2.6.18-194.11.AXS3.i386.rpm
MD5: 1550862f63dde1bff0774c0d09d37d23
SHA-256: bb8a5b2f9cfe4631d79c25303bc57a2f5fdd5ea19e7b270eeba5cd5fd613142e
Size: 1.07 MB
Asianux Server 3 for x86_64
- kernel-2.6.18-194.11.AXS3.x86_64.rpm
MD5: d890288b63c4edce598a9037c1639ea5
SHA-256: 3bd5e834605b22e1bcd62d9d88f5d79e69eb8c64f0ea59a023cddd9d25c456cf
Size: 19.19 MB - kernel-devel-2.6.18-194.11.AXS3.x86_64.rpm
MD5: a06780d25f8acdf66748c578f1863b3e
SHA-256: 506b7b30dba362fc1a644b919006d2999a361238e52f4f475245d2206c3dc952
Size: 5.61 MB - kernel-headers-2.6.18-194.11.AXS3.x86_64.rpm
MD5: 7748e187f4b5562c19dcb82e48c9075e
SHA-256: e65d0302444d34de8ad74c977ef0daaa4e683d2e886e22b3c71e9e6254c8571c
Size: 1.11 MB - kernel-xen-2.6.18-194.11.AXS3.x86_64.rpm
MD5: 72e7ac9ca3374b8487d451f62bbcbd19
SHA-256: c371e16743b8eba5e5c4acddd9cb8694c06d547d23cd8e81eac2470bee1a082e
Size: 20.09 MB - kernel-xen-devel-2.6.18-194.11.AXS3.x86_64.rpm
MD5: a2d1b8af9354aef98140b6c5a7e39ec8
SHA-256: 8abc2f2da8da2d79369d9b8e4c3fd18cf273e38038335ff252cf204018765f9b
Size: 5.61 MB - kernel-doc-2.6.18-194.11.AXS3.noarch.rpm
MD5: 7685d16c882dda17727b022eb220182e
SHA-256: 4208c540eb22bc72e5e27f98d12d86a31c5b6fde8c0160ac052b421d21a4b282
Size: 3.08 MB