kernel-2.6.18-194.13.AXS3

エラータID: AXSA:2011-264:04

Release date: 
Friday, July 22, 2011 - 14:13
Subject: 
kernel-2.6.18-194.13.AXS3
Affected Channels: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2011-0726
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
CVE-2011-1093
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
CVE-2011-1170
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1171
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1172
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1163
The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
CVE-2011-1494
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
CVE-2011-1495
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
CVE-2011-1577
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
CVE-2011-1078
CVE-2011-1079
CVE-2011-1080
CVE-2011-1166
CVE-2011-1763
No descriptions at the time of writing, please use the CVE links below.
Fixed bugs:
For an exhasive list of other fixes, please refer to the changelog

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

Asianux Server 3 for x86
  1. kernel-2.6.18-194.13.AXS3.i686.rpm
    MD5: 48cb24d64caac3f1baa1c85bf2d90312
    SHA-256: 12741a9812e6c4701e50a219c1b345cc3638dba6ccef9dc4410500ba23447c14
    Size: 17.26 MB
  2. kernel-devel-2.6.18-194.13.AXS3.i686.rpm
    MD5: 189e528a465cc9a121fffe57adda9d73
    SHA-256: 650b8fa69b7845b865fc53bdc0027daf30deda4b14f37cf82ed6acf42da0e2e5
    Size: 5.60 MB
  3. kernel-PAE-2.6.18-194.13.AXS3.i686.rpm
    MD5: 27b0ba0fc0994867d72522791384cc0b
    SHA-256: 58e81f2f99b546d7ef319168baa89c54908c8efd4e2cb69028896036f96a1f52
    Size: 17.28 MB
  4. kernel-PAE-devel-2.6.18-194.13.AXS3.i686.rpm
    MD5: c0612e61f820f682cda6aa272ca91e8d
    SHA-256: bb62d6cc6d620aa67aafefe0a0177618390625f96af4b5ed282c6cf7d9e702e0
    Size: 5.61 MB
  5. kernel-xen-2.6.18-194.13.AXS3.i686.rpm
    MD5: 059bd4a378acf6db4257b2816e4e5858
    SHA-256: ab999e71bd67e882d0331b1982d025670f7c372a29b2ef019c7b0d1b873887d4
    Size: 18.37 MB
  6. kernel-xen-devel-2.6.18-194.13.AXS3.i686.rpm
    MD5: f0ff4fdac1e1e6cc795db6775e72fe6b
    SHA-256: f1042ffbe8e7adb35a2c5fe04a20fe34e3c69db93e4e9664451ce28736392b76
    Size: 5.61 MB
  7. kernel-doc-2.6.18-194.13.AXS3.noarch.rpm
    MD5: d1958b8557572b3fa54e30610ee31481
    SHA-256: 0825f896b6cbea013e8af977fc4e77e4f7269671576c91d94ec95f1394a077f6
    Size: 3.08 MB
  8. kernel-headers-2.6.18-194.13.AXS3.i386.rpm
    MD5: e7c995231a0b74de1691ed8118d8b23e
    SHA-256: 3613ee4e3545e02df5f22ef90d08a9bca47b35d0b6eef4ecba97cd8b9e915f90
    Size: 1.08 MB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-194.13.AXS3.x86_64.rpm
    MD5: 65d1e17b606257645c06c4ca2892272f
    SHA-256: e522b37b7bafb9f3d23b32afff6b3dd61a310757af6d497c070583eca0e8d91c
    Size: 19.19 MB
  2. kernel-devel-2.6.18-194.13.AXS3.x86_64.rpm
    MD5: d435254ab423e50928288c3df3995cc6
    SHA-256: 57bc1777348fb072437a780df8cd5cf96580ffd4704648002b1fed31d6219f9c
    Size: 5.61 MB
  3. kernel-headers-2.6.18-194.13.AXS3.x86_64.rpm
    MD5: c313eca59c0ea8f9f6037cc654d45bdc
    SHA-256: 4d9e2c34c7badc605a3fed0a0db673a5405238921a2b67fb54a2b1934732b4df
    Size: 1.11 MB
  4. kernel-xen-2.6.18-194.13.AXS3.x86_64.rpm
    MD5: 1025fd4571d365d51edc50e44f3b8dbc
    SHA-256: 1f4556ae5c83d31fd757009ad392cf466c33da6a8680428ad8393f533ea7333f
    Size: 20.09 MB
  5. kernel-xen-devel-2.6.18-194.13.AXS3.x86_64.rpm
    MD5: 56372540f4e4124886f33d4d47f607ce
    SHA-256: a5259a586de83cd46d226edbe3c7c97010e12cae6acf04950985b72b171e6c45
    Size: 5.61 MB