kernel-2.6.18-238.2.AXS3

エラータID: AXSA:2011-282:05

Release date: 
Tuesday, September 13, 2011 - 11:52
Subject: 
kernel-2.6.18-238.2.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2011-0726
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
CVE-2011-1093
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
CVE-2011-1170
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1171
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1172
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
CVE-2011-1163
The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
CVE-2011-1494
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
CVE-2011-1495
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
CVE-2011-1577
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
CVE-2010-4346
The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
CVE-2011-0521
The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
CVE-2011-0710
The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.
CVE-2011-1010
Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.
CVE-2011-1090
The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
CVE-2010-4249
The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
CVE-2010-4251
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
CVE-2010-4655
net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
CVE-2010-4526
Race condition in the Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
CVE-2010-3296
The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
CVE-2010-3877
The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
CVE-2010-4072
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the old shm interface.
CVE-2010-4073
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
CVE-2010-4075
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
CVE-2010-4080
The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4081
The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
CVE-2010-4158
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
CVE-2010-4238
The vbd_create function in Xen 3.1.2, when the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 is used, allows guest OS users to cause a denial of service (host OS panic) via an attempted access to a virtual CD-ROM device through the blkback driver. NOTE: some of these details are obtained from third party information.
CVE-2010-4243
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an OOM dodging issue, a related issue to CVE-2010-3858.
CVE-2010-4255
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
CVE-2010-4263
The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.
CVE-2010-4343
drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
CVE-2011-1078
CVE-2011-1079
CVE-2011-1080
CVE-2011-1166
CVE-2011-1763
CVE-2011-1478
No description available at the time of writing, please refer to the CVE links below.
Fixed bugs:
Too many to list here but here are some of the main ones:
- Changed the value of debug parameter from 0 to 1 to provide kernel-debug-devel.
- Merged patches from 2.6.18-194.11.AXS3
- Modified all i686, x86_64 and ia64 kernel config files
- Modified config-rhel-generic to enable ocfs2

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.18-238.2.AXS3.src.rpm
    MD5: 697b98d9bf30db41e9a63e55cf2b2585
    SHA-256: 1d4265b9fbde2874f53635df63ef8dda2d691403a5bf9e2c4e558602f0569864
    Size: 86.04 MB

Asianux Server 3 for x86
  1. kernel-2.6.18-238.2.AXS3.i686.rpm
    MD5: ba27b0b20aab446906350752277cc8c8
    SHA-256: 5322cc63a6ba09d0b4da425b83cc5a0ffb63a2b7d96b15f417fbf1cf10cd2a9d
    Size: 17.54 MB
  2. kernel-debug-devel-2.6.18-238.2.AXS3.i686.rpm
    MD5: 1dece7870b7d4986492f3bde6a4b6fd2
    SHA-256: d3d911bb122734be78581f31f008051f0b426f0be32ebb7d04e462f8a4421097
    Size: 5.75 MB
  3. kernel-devel-2.6.18-238.2.AXS3.i686.rpm
    MD5: 260e2e16e002b3fa39272c60a54a9426
    SHA-256: 238e9291cd224b386178088f30b5fb5394fa17758fd42df714f3d28f227a99cb
    Size: 5.69 MB
  4. kernel-PAE-2.6.18-238.2.AXS3.i686.rpm
    MD5: 2a139ce209f6899a9db32dd2ff2e2d51
    SHA-256: 0b4978b9e5f36ca3bbca3675aac542573b05a0fe28dbe6c5feda13a992f47519
    Size: 17.56 MB
  5. kernel-PAE-devel-2.6.18-238.2.AXS3.i686.rpm
    MD5: a00cf71b9c910fc1eb4a78d8ac73478d
    SHA-256: dea562697857367d51e1e213904d0b7e1111712af59ba19bfd64e457797736d2
    Size: 5.70 MB
  6. kernel-xen-2.6.18-238.2.AXS3.i686.rpm
    MD5: 537dbc3c06cdc9b2c2c35d6aa860472f
    SHA-256: 194d27f072209c105d5caad449d5b330feac89e142f18b39a0216f681799980c
    Size: 18.69 MB
  7. kernel-xen-devel-2.6.18-238.2.AXS3.i686.rpm
    MD5: cd308d2f9e2b46caec1689fa54551796
    SHA-256: 8a96454a4fc5ae1d8388e57e6e8732b3559947041c14373093e6e225882783cf
    Size: 5.70 MB
  8. kernel-doc-2.6.18-238.2.AXS3.noarch.rpm
    MD5: 9bee8d133851669a1454559122f6734b
    SHA-256: e4dc707dab6a75fe78fec38b0de161f09b38d20d2ea9a8c3572aad5ea06c5bf9
    Size: 3.16 MB
  9. kernel-headers-2.6.18-238.2.AXS3.i386.rpm
    MD5: 86f941cb2d04ab8fe574152dfc56a761
    SHA-256: 4ebfc5b7cd4041e8bb979b7697f572e2d2e9dc7029b941dc11dcc34ca080b062
    Size: 1.15 MB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: 51aa40ff5ea809e160b91900953048e6
    SHA-256: 3af20933a2b53508423654b2363906f128ffa0dfd70c2fa2500f00503951bec6
    Size: 19.60 MB
  2. kernel-debug-devel-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: e5b152942d126e969aaa0c5318c2cc62
    SHA-256: c0e8f900f4d9de14c887154a97fa0f60ac51427a8bac692f90a22bcf5e047ea1
    Size: 5.75 MB
  3. kernel-devel-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: 00b3fe7100e94c391e5260f49ca7d301
    SHA-256: 00120c1a2af23d7ede75e7990b610cc26d1a00a5ab84c5d73e558918b2bd658a
    Size: 5.69 MB
  4. kernel-headers-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: 01347472952a773cb4767e99b48f6a23
    SHA-256: 1d4b33693b6600817d41e751c71339c636bed8c7b908dc3ec4f6dc60c12a3348
    Size: 1.19 MB
  5. kernel-xen-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: 5c6f714809e69ffd06cd6b755b0395c4
    SHA-256: 46a5eeeeeaa4abd03d8e9d5c72546148d389a905af936b178f9c6d2d43482cbe
    Size: 20.54 MB
  6. kernel-xen-devel-2.6.18-238.2.AXS3.x86_64.rpm
    MD5: 7fd67b2bd03c696d98037abcbc8bd6f7
    SHA-256: b8e4ec68a932ebddcc743db93ea88ffd71aac31b8a8bdc000c2ebd6ac80f0e10
    Size: 5.70 MB
  7. kernel-doc-2.6.18-238.2.AXS3.noarch.rpm
    MD5: 655c88808496bc3c3e8cb8da178d8289
    SHA-256: 7b85d720762bd52dc1397f88711850f86d191e8e76538d190a38334880965345
    Size: 3.16 MB