kernel-2.6.18-128.8AXS3

エラータID: AXSA:2009-370:08

リリース日: 
2009/08/19 Wednesday - 12:32
題名: 
kernel-2.6.18-128.8AXS3
影響のあるチャネル: 
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity: 
High
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.
Fixed bugs:
CVE-2007-5966
Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
CVE-2009-1385
Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
CVE-2009-1388
The ptrace_start function in kernel/ptrace.c in the Linux kernel 2.6.18 does not properly handle simultaneous execution of the do_coredump function, which allows local users to cause a denial of service (deadlock) via vectors involving the ptrace system call and a coredumping thread.
CVE-2009-1389
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
CVE-2009-1895
The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
CVE-2009-2406
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
CVE-2009-2407
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.

解決策: 

Update packages

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. kernel-2.6.18-128.8AXS3.src.rpm
    MD5: fe6da90f8aac04ed1aad5fef1c5f694a
    SHA-256: 90db952ea885079af9461a61620bbe94b6e5dd8677807320d52e0fa0738f160e
    Size: 66.31 MB

Asianux Server 3 for x86
  1. kernel-2.6.18-128.8AXS3.i686.rpm
    MD5: 3475b447da713c379468b8472134a85e
    SHA-256: aeb252af32f151c3119c53b84cdfb3415f82a45d26a23e5690b34c15b9b60cb6
    Size: 15.28 MB
  2. kernel-devel-2.6.18-128.8AXS3.i686.rpm
    MD5: 2fb5c4683806a2d132312e53dc744ce3
    SHA-256: 568b7841abe2175d7270d61638e7348637f8a999e0491d95ca8285107e4193ee
    Size: 5.10 MB
  3. kernel-PAE-2.6.18-128.8AXS3.i686.rpm
    MD5: f9a9a399268c3611fdd8e08f04cee643
    SHA-256: ae4ea83743d60815f808ffdc5461cf1122960f8db19ce98aa2eb86add00c3d5e
    Size: 15.30 MB
  4. kernel-PAE-devel-2.6.18-128.8AXS3.i686.rpm
    MD5: f2ad2bbb906b43fac7c4bf6600e00599
    SHA-256: 4c33e914bfb63192fb62596e7bf676ad54cdeb16ed835065e312b013e98bc078
    Size: 5.11 MB
  5. kernel-xen-2.6.18-128.8AXS3.i686.rpm
    MD5: e2c7367ca52949da7d87a87dd2262dd7
    SHA-256: 85677973cb869d136a071cf78db06100df8a1acddff406099e3ce67eed7727d7
    Size: 16.26 MB
  6. kernel-xen-devel-2.6.18-128.8AXS3.i686.rpm
    MD5: e066e8538851eaea619c610d3bfa6752
    SHA-256: 5e0dda5edc78a991a6ac0d13cb83ed03adadbd6f8bef9c358705c6fce8372cb1
    Size: 5.10 MB
  7. kernel-doc-2.6.18-128.8AXS3.noarch.rpm
    MD5: b9f19cec99d09b40f210cfb12a2fe926
    SHA-256: 7abe7dbb2c3061f8a870b67fb7629fb2fc3ffdb19de3c2a3964d124842813922
    Size: 2.92 MB
  8. kernel-headers-2.6.18-128.8AXS3.i386.rpm
    MD5: f7246b4eec59b39bc8e6609b000cfe58
    SHA-256: 75cc9961efd6c4bd651dcd3fd380419b593f496308915a1c016ba4447d668b99
    Size: 941.87 kB

Asianux Server 3 for x86_64
  1. kernel-2.6.18-128.8AXS3.x86_64.rpm
    MD5: 3a8bf6c27bc6a7797862d3a750a4903c
    SHA-256: 1e824fb049d6d14b22cf9cc9502826ed5ef7de244da55a6d41d13ab195d07689
    Size: 16.84 MB
  2. kernel-devel-2.6.18-128.8AXS3.x86_64.rpm
    MD5: f39385b1288860e51ed0a14cc2f6faec
    SHA-256: 769cc6b258d935c12762fdfa392965c775032622f5644478c69c7b8428170515
    Size: 5.28 MB
  3. kernel-headers-2.6.18-128.8AXS3.x86_64.rpm
    MD5: d1c6fbc358414025db16c6aab84f371e
    SHA-256: 9f324aab048ba7d0e97f86fac36a4eaed165ec1e9bd3ed0282f7fa02e8c74964
    Size: 0.96 MB
  4. kernel-xen-2.6.18-128.8AXS3.x86_64.rpm
    MD5: 29e184c9d9193fdfd43010b8c260e90e
    SHA-256: 2d2931776de044a8bd85e8f0bf971d232f9cb1c9ad6ed77735377dab6816e165
    Size: 17.49 MB
  5. kernel-xen-devel-2.6.18-128.8AXS3.x86_64.rpm
    MD5: c289b368fd7b67581002885d6f36a7a8
    SHA-256: 3e91614786a5ae69e49f4352325c56c370e00348da24ac1ff43f56517aa7878f
    Size: 5.29 MB
  6. kernel-doc-2.6.18-128.8AXS3.noarch.rpm
    MD5: d2f0018535ea8695310ff094037c38a3
    SHA-256: 7ebf72fc0e25c7f6df03adcacab441209717de5583ae5f7dc3ffd25fe6cd8c50
    Size: 2.92 MB