kernel-2.6.18-348.1.AXS3
エラータID: AXSA:2013-80:01
リリース日:
2013/02/20 Wednesday - 13:53
題名:
kernel-2.6.18-348.1.AXS3
影響のあるチャネル:
Asianux Server 3 for x86
Asianux Server 3 for x86_64
Severity:
High
Description:
以下項目について対処しました。
[Security FIx]
- RDS(Reliable Datagram Sockets)プロトコルのrds_ib_xmit関数の実装にセキュリティ上の欠陥が検出されました。権限のないローカルユーザが特定のRDSコネクションを確立することによってサービス拒否(カーネルパニック)を引き起こす危険性があります。(CVE-2012-2372)
- IPの実装に競合の問題が検出されました。リモートアタッカーがソケットオプションをセットするアプリケーションにパケットを送ることによりサービス拒否(システムクラッシュ)を引き起こす危険性があります。(CVE-2012-3552)
- ext4ファイルシステムの実装に競合の問題が検出されました。権限のないローカルユーザが削除されたファイルから情報を得る危険性があります。(CVE-2012-4508)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2012-2372
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
CVE-2012-3552
Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
CVE-2012-4535
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
CVE-2012-4537
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
CVE-2012-5513
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-2.6.18-348.1.AXS3.src.rpm
MD5: c5d3605b6dda118e913d5ca51964b387
SHA-256: b9a700c6365046bad54e5989364f87c96f6157660e6323dac2dcda33042c360f
Size: 65.82 MB
Asianux Server 3 for x86
- kernel-2.6.18-348.1.AXS3.i686.rpm
MD5: d0761575694a3e651064b4cf6b12b9ff
SHA-256: 7a832ee86e03fd193d118c191c405f61611506a413a63bb8d241b7b5c3f4565d
Size: 19.79 MB - kernel-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: 35358a5a8fa872016b335455238ce614
SHA-256: 998e447adbcfd6311865819bf0495df480b3d81e276b0b03b489ff0f12bf4d47
Size: 6.04 MB - kernel-doc-2.6.18-348.1.AXS3.noarch.rpm
MD5: 853d7c04e0fe9ec852857921f2024b7f
SHA-256: 00b541eb546b0337328d6a4f218ba9a62930f5412ad11f0e46f7dff194441047
Size: 3.47 MB - kernel-headers-2.6.18-348.1.AXS3.i386.rpm
MD5: ebb7c6f604c91f9fdab75d58eaa9c88b
SHA-256: dfbc568295e89d0bfe85e93c08a9e084e61691c0b8fc048a24b5388ad8250482
Size: 1.44 MB - kernel-PAE-2.6.18-348.1.AXS3.i686.rpm
MD5: 367ac8832fa9f3c847c39d066d908ef6
SHA-256: 0af1e3e07749a09aad54560a81e453c4c67fb6dec7d3bc2417cb826b59e16782
Size: 19.81 MB - kernel-PAE-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: c15c5be30d75a4b988159e258f25ce49
SHA-256: 436b43d836720767510e06f619ebd44fa64237f5ec2dd66998d33c4cb0256010
Size: 6.05 MB - kernel-xen-2.6.18-348.1.AXS3.i686.rpm
MD5: 6c5ab78b7bdb3f216de88ae2af2e2c4b
SHA-256: a43e1b2463b906c427997946f73ea3e9eebc14f217c02eaae26f4635421324c8
Size: 20.90 MB - kernel-xen-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: 6f03f6eac7567864dae3e8336cf3e42a
SHA-256: dd10f7daf4c586fd1d7700fd13413e0edfa421cc5bb7c1788a9078ae9751a990
Size: 6.05 MB
Asianux Server 3 for x86_64
- kernel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 32a2759fe7ad3ba5c24d07d144007860
SHA-256: e6d952a4a9ff63137edfdffd96f1a790a64a4ecd283cd646e661ad33d4ecf4ca
Size: 22.10 MB - kernel-devel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: c48ed8a4af679b071c26ca8bf2855f1c
SHA-256: 7a8befcdb5024e25ce3ce366229a518f615b0ebdcbe70c51795394a8349f2178
Size: 6.04 MB - kernel-doc-2.6.18-348.1.AXS3.noarch.rpm
MD5: 2f56444f300df98c506d6df135c128af
SHA-256: fa5187cec106fa3d8d7f052ca1ff60adb604d3aa53892637f42455f7bda33b8d
Size: 3.47 MB - kernel-headers-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 4736595ad8ce9745d38fa008e2f0bcef
SHA-256: 3e42ef7c68af94071b411277144ab1ede766a703d0cce0be2723f7f2af87be09
Size: 1.48 MB - kernel-xen-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 065d9c51a30141f5b9fc8717609ad3d6
SHA-256: 55500f017736c9c67218d3671d242ff7ff3add668178ebb7686645c1b383ce4e
Size: 22.96 MB - kernel-xen-devel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: d8f90036872c5fc5a19608a1268ffd12
SHA-256: 5983843d13b0b68350e9962a6e332d989d9e4d6b67075f599a09b13fbfa67989
Size: 6.05 MB