kernel-2.6.18-274.1.AXS3

エラータID: AXSA:2011-313:06

Release date: 
Monday, October 10, 2011 - 20:22
Subject: 
kernel-2.6.18-274.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-4649
Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
CVE-2011-0695
Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.
CVE-2011-0711
The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
CVE-2011-1044
The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
CVE-2011-1576
Red Hat Enterprise Virtualization (RHEV) Hypervisor allows remote attackers to cause a denial of service via unspecified vectors that cause the napi_reuse_skb function to be used on VLAN packets, which triggers (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
CVE-2011-1593
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
CVE-2011-1745
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
CVE-2011-1746
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
CVE-2011-2213
The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
CVE-2011-2492
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
CVE-2011-2689
The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
CVE-2011-1780
CVE-2011-2525
CVE-2011-1936
CVE-2011-1182
CVE-2011-1573
No descriptions available at the time of writing, please refer to the CVE links below.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

Asianux Server 3 for x86
  1. kernel-2.6.18-274.1.AXS3.i686.rpm
    MD5: 433e90fdfc8d6d40d669837b0263b286
    SHA-256: 6a2168e76042575cfc46b0c47e38555e9b5d8cd1179e4d55cc3c9684a2b6e3fd
    Size: 18.73 MB
  2. kernel-devel-2.6.18-274.1.AXS3.i686.rpm
    MD5: 3d2791c33ee88eedcf09da3f7f3ea9ab
    SHA-256: 1182cac0608a9e651528e10418a391b1b3e5c32798fa894a84bf40a38a123959
    Size: 5.81 MB
  3. kernel-PAE-2.6.18-274.1.AXS3.i686.rpm
    MD5: 7076fd3a0268eb3e56f026091d2575e6
    SHA-256: e594e6131b00a124e7bccf4b136544c41783c548fec9aba7c628499e2753af6c
    Size: 18.75 MB
  4. kernel-PAE-devel-2.6.18-274.1.AXS3.i686.rpm
    MD5: 27e9328de3a8aa797b14815b1b1c7bf7
    SHA-256: e86e55a30a9a886097173a537356783de71c37b8eb4281f0dbcb44059e1caad5
    Size: 5.82 MB
  5. kernel-xen-2.6.18-274.1.AXS3.i686.rpm
    MD5: 3fe04942a01e6e77dbaea9e1a6deb303
    SHA-256: 00c3ca94cf615179374aa663f88c996a91f001ad98ce3c9e1354cc7320606dc8
    Size: 19.89 MB
  6. kernel-xen-devel-2.6.18-274.1.AXS3.i686.rpm
    MD5: b981ffc21922dea5070265e6982aae69
    SHA-256: 34123bb7bff60d67adb37dffb5833b1ac89929119463205cb40fbd0dd0030fa4
    Size: 5.82 MB
  7. kernel-doc-2.6.18-274.1.AXS3.noarch.rpm
    MD5: b4b5a7a58c0c6c132b8c8d86f2f15c0b
    SHA-256: c0fcbbe0fbd38b0f784dbbee018b0a9f072fcea02eeb68b3d980d8939cb122fd
    Size: 3.28 MB
  8. kernel-headers-2.6.18-274.1.AXS3.i386.rpm
    MD5: 39a79ff174e41db493b8cfd4dd75221f
    SHA-256: ab6b89b2d1d3f217012ffe113f7617658a513cf3586aded6e63841869b4cd1e7
    Size: 1.25 MB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-274.1.AXS3.x86_64.rpm
    MD5: 3003a5ff3faab96e8e6bcd51fd411936
    SHA-256: de1037b6b1e9af739ef4e2dba426d08b853fe6f62c69aecc484a625c4b77592e
    Size: 20.82 MB
  2. kernel-devel-2.6.18-274.1.AXS3.x86_64.rpm
    MD5: 54a9f8bd79ece10dc14a7d275016dc74
    SHA-256: 968a19810b31cebe3125322518254ba7624aa733518b9e7f719ad28d41041d0f
    Size: 5.82 MB
  3. kernel-headers-2.6.18-274.1.AXS3.x86_64.rpm
    MD5: 8d0b4cde3169570bbe62348c16a4453a
    SHA-256: 69cabda29816f2b4ddbc26a007179ef6da40eea73f0a33b41ccacb6ce180bada
    Size: 1.29 MB
  4. kernel-xen-2.6.18-274.1.AXS3.x86_64.rpm
    MD5: c29c55ee93e4889f4f2c71437a6f817f
    SHA-256: 786851dfe8d8dd0695fc1f682bea6b916af65cd60e06e8b8dcc25ee7c4714e26
    Size: 21.74 MB
  5. kernel-xen-devel-2.6.18-274.1.AXS3.x86_64.rpm
    MD5: dc00fce2d42b1146acae9377c24a21f4
    SHA-256: 046138136e82aff86d6bcac2c2a731f12e249b3e00487f0515a415b4fe32cd0b
    Size: 5.82 MB
  6. kernel-doc-2.6.18-274.1.AXS3.noarch.rpm
    MD5: c38cdd9e7366f1eeb0d24dd6aa45b9e6
    SHA-256: ffb039a6000fc4f0af2117c03405c6a9d516ce0bf67d88461b8c56f0e917c76a
    Size: 3.28 MB