kernel-2.6.18-274.1.AXS3
エラータID: AXSA:2011-313:06
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
CVE-2010-4649
Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
CVE-2011-0695
Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.
CVE-2011-0711
The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
CVE-2011-1044
The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
CVE-2011-1576
Red Hat Enterprise Virtualization (RHEV) Hypervisor allows remote attackers to cause a denial of service via unspecified vectors that cause the napi_reuse_skb function to be used on VLAN packets, which triggers (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
CVE-2011-1593
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
CVE-2011-1745
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
CVE-2011-1746
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
CVE-2011-2213
The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
CVE-2011-2492
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
CVE-2011-2689
The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
CVE-2011-1780
CVE-2011-2525
CVE-2011-1936
CVE-2011-1182
CVE-2011-1573
No descriptions available at the time of writing, please refer to the CVE links below.
Update packages.
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call.
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.
Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.
The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
N/A
Asianux Server 3 for x86
- kernel-2.6.18-274.1.AXS3.i686.rpm
MD5: 433e90fdfc8d6d40d669837b0263b286
SHA-256: 6a2168e76042575cfc46b0c47e38555e9b5d8cd1179e4d55cc3c9684a2b6e3fd
Size: 18.73 MB - kernel-devel-2.6.18-274.1.AXS3.i686.rpm
MD5: 3d2791c33ee88eedcf09da3f7f3ea9ab
SHA-256: 1182cac0608a9e651528e10418a391b1b3e5c32798fa894a84bf40a38a123959
Size: 5.81 MB - kernel-PAE-2.6.18-274.1.AXS3.i686.rpm
MD5: 7076fd3a0268eb3e56f026091d2575e6
SHA-256: e594e6131b00a124e7bccf4b136544c41783c548fec9aba7c628499e2753af6c
Size: 18.75 MB - kernel-PAE-devel-2.6.18-274.1.AXS3.i686.rpm
MD5: 27e9328de3a8aa797b14815b1b1c7bf7
SHA-256: e86e55a30a9a886097173a537356783de71c37b8eb4281f0dbcb44059e1caad5
Size: 5.82 MB - kernel-xen-2.6.18-274.1.AXS3.i686.rpm
MD5: 3fe04942a01e6e77dbaea9e1a6deb303
SHA-256: 00c3ca94cf615179374aa663f88c996a91f001ad98ce3c9e1354cc7320606dc8
Size: 19.89 MB - kernel-xen-devel-2.6.18-274.1.AXS3.i686.rpm
MD5: b981ffc21922dea5070265e6982aae69
SHA-256: 34123bb7bff60d67adb37dffb5833b1ac89929119463205cb40fbd0dd0030fa4
Size: 5.82 MB - kernel-doc-2.6.18-274.1.AXS3.noarch.rpm
MD5: b4b5a7a58c0c6c132b8c8d86f2f15c0b
SHA-256: c0fcbbe0fbd38b0f784dbbee018b0a9f072fcea02eeb68b3d980d8939cb122fd
Size: 3.28 MB - kernel-headers-2.6.18-274.1.AXS3.i386.rpm
MD5: 39a79ff174e41db493b8cfd4dd75221f
SHA-256: ab6b89b2d1d3f217012ffe113f7617658a513cf3586aded6e63841869b4cd1e7
Size: 1.25 MB
Asianux Server 3 for x86_64
- kernel-2.6.18-274.1.AXS3.x86_64.rpm
MD5: 3003a5ff3faab96e8e6bcd51fd411936
SHA-256: de1037b6b1e9af739ef4e2dba426d08b853fe6f62c69aecc484a625c4b77592e
Size: 20.82 MB - kernel-devel-2.6.18-274.1.AXS3.x86_64.rpm
MD5: 54a9f8bd79ece10dc14a7d275016dc74
SHA-256: 968a19810b31cebe3125322518254ba7624aa733518b9e7f719ad28d41041d0f
Size: 5.82 MB - kernel-headers-2.6.18-274.1.AXS3.x86_64.rpm
MD5: 8d0b4cde3169570bbe62348c16a4453a
SHA-256: 69cabda29816f2b4ddbc26a007179ef6da40eea73f0a33b41ccacb6ce180bada
Size: 1.29 MB - kernel-xen-2.6.18-274.1.AXS3.x86_64.rpm
MD5: c29c55ee93e4889f4f2c71437a6f817f
SHA-256: 786851dfe8d8dd0695fc1f682bea6b916af65cd60e06e8b8dcc25ee7c4714e26
Size: 21.74 MB - kernel-xen-devel-2.6.18-274.1.AXS3.x86_64.rpm
MD5: dc00fce2d42b1146acae9377c24a21f4
SHA-256: 046138136e82aff86d6bcac2c2a731f12e249b3e00487f0515a415b4fe32cd0b
Size: 5.82 MB - kernel-doc-2.6.18-274.1.AXS3.noarch.rpm
MD5: c38cdd9e7366f1eeb0d24dd6aa45b9e6
SHA-256: ffb039a6000fc4f0af2117c03405c6a9d516ce0bf67d88461b8c56f0e917c76a
Size: 3.28 MB