kernel-2.6.18-53.11AXS3
エラータID: AXSA:2008-150:05
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device
input and output, etc.
- [cpufreq] : coordinate to keep abi compatibility with rhel51 (Patch104214)
[Bug 4145]
- revert : CVE-2007-4571 : Convert snd-page-alloc proc file to use seq_file for
alsa (Patch200105) [Bug 4145]
- [sky2] : Disable checksum on Yukon2-XL to prevent an annoying error message
caused by the chip glitch (Patch102620) [Bug 4898]
- [x86_64] replace : extend MCE banks support for Dunnington, Nehalem
(Patch108110 -> Patch108111) [Bug 4793]
- [scsi] replace : megaraid_sas: wait for cmd_status to change (Patch103130)
[Bug 4543]
- [nfs] sunrpc: fix hang due to eventd deadlock (Patch108090) [Bug 4703]
- [nfs] sunrpc: fix a race in rpciod_down (Patch108091) [Bug 4703]
- [x86_64] Switching to vsyscall64 causes oops (Jeff Burke) (Patch108100)
[Bug 4740]
- [x86_64] Remove 6 bank limitation in 64 bit MCE reporting code (Patch108110)
[Bug 4457]
- [scsi] megaraid_sas: wait for cmd_status to change (Patch103130) [Bug 4543]
- [scsi] megaraid_sas: many illegal interrupts appear (Patch103131) [Bug 4779]
- [cpufreq] Add check for dmi_data in powernow_k8 driver
(Patch104211 Patch104213) [Bug 4604]
- [MAZE] Update MAZE to replace Patch file (Patch300002) [Bug 4774]
- [cpufreq] revert: Hot fix about cpufreq (Patch104211) [Bug 4604]
- [cxgb3] revert: Merge cxgb3 driver version 1.0.129a. Although TOE can work with
CONFIG_TCP_OFFLOAD, we disable by default. (Patch103090) [Bug 4145]
- [net] ipv6: Drop packets for loopback address from outside of the box
(Patch108086) [Bug 4546]
- [scsi] lpfc: Update version from 8.1.10.9 to 8.2.0.22 with bug fix
(Patch102100 - Patch102104) [Bug 4462]
- [cpufreq] Hot fix about cpufreq (Patch104200 - Patch104211) [Bug 3958]
- [cpufreq] Hot fix about cpufreq (Patch104212) [Bug 4531]
- [x86] Correct cpu cache info for Intel Tolapai (Patch108084) [Bug 4475]
- [x86] Support ICH10 (Patch108085) [Bug 4527]
- [misc] Fix a deadlock about smp_send_stop when panic (Patch200100) [Bug 4205]
- [misc] Fix a deadlock on on_each_cpu (Patch200101) [Bug 4345]
- [x86] report_lost_ticks fix up (Patch100120) [Bug 4161]
- [e1000e] Revert 7.6.15.5-NAPI and update to 0.2.9.5 (Patch103113 Patch103114)
[Bug 4247]
- [net] (IPV6) Accept routing header only when hdr->segments_left is zero
(Patch108080) [Bug 4377]
- [net] (IPV6) Fix BUG of ndisc_send_redirect()
backport from 2.6.20 (Patch108081) [Bug 4379]
- [net] (IPV6) Fix ICMPv6 redirect handling with target multicast address
backport from 2.6.23 (Patch108082) [Bug 4379]
- [net] (IPV6) Defer IPv6 device initialization until a valid qdisc is specified
(Patch108083) [Bug 4380]
- [ioat] Update ioat device ids (Patch108032) [Bug 4289]
- CVE-2007-4571 : Convert snd-page-alloc proc file to use seq_file for alsa
[Patch200105]
- CVE-2007-4997 : off-by-two integer underflow for ieee80211 [Patch200106]
- CVE-2007-5494 : missing dput in do_lookup error leaks dentries for fs
[Patch200107]
- [fs] sysfs: store inode nrs in s_ino (Eric Sandeen ) [245777] {CVE-2007-3104}
[Patch200108]
- Delete [Patch103007], which been instead by [Patch200108]
- [fs] sysfs: fix condition check in sysfs_drop_dentry() (Eric Sandeen )
[245777] {CVE-2007-3104} [Patch200109]
- [fs] sysfs: fix race condition around sd->s_dentry (Eric Sandeen ) [245777]
{CVE-2007-3104} [Patch200110]
- [fs] core dump file ownership (Don Howard ) [396991] {CVE-2007-6206}
[Patch200111]
- [fs] corruption by unprivileged user in directories (Vitaly Mayatskikh )
[428796] {CVE-2008-0001} [Patch200112]
- CVE-2008-0600 : kernel vmsplice_to_pipe flaw [Patch200115]
- CVE-2006-6921 : Denial of service with wedged processes [Patch200116]
- CVE-2007-6063 : fix possible isdn_net buffer overflows [Patch200118]
- CVE-2007-6694 : fix possible strncmp NULL pointer usage [Patch200119]
- CVE-2007-5938 : fix NULL dereference in iwl driver [Patch200120]
- [KAHO] Delete Debug option (Patch300004) [Bug 4290]
- [KAHO] Fix the invalid state change (Patch300004) [Bug 4291]
- [KAHO] Fix the deadlock in consecutive memory allocation (Patch300004) [Bug 4292]
- [KAHO] Fix typo in error message (Patch300004) [Bug 4293]
- [MAZE] Update MAZE to replace Patch file (Patch300002) [Bug 4309]
- [e1000e] Fix network link down when repeating to reboot (Patch103112)
[Bug 4184]
- [MAZE] Update MAZE to replace Patch file (Patch300002) [Bug 4181]
- [E7221] Add E7221 pci ids to kernel (Patch108040) [Bug 3909]
- [IA64] forbid ptrace changes psr.ri to 3 (Patch108050) [Bug 3576]
- [igb] Backport patch for 2.6.18 (Patch103081) [Bug 4129]
- [stex] Update patch of 3.06.0205.00 (Patch102060) [Bug 3858]
- [ocfs2] Update version number to 1.2.8 (Patch103100) [Bug 4073]
- [e1000e] Fix unknown symbol e1000_intr_msi (Patch103110) [Bug 4105]
- [e1000e] Fix ethtool gets a wrong driver name (Patch103111) [Bug 4144]
- [IOAPIC] Fix IOAPIC uniqe ID checking (Patch108060) [Bug 4057]
- [cxgb3] Merge cxgb3 driver version 1.0.129a. Although TOE can work with
CONFIG_TCP_OFFLOAD, we disable by default. (Patch103090) [Bug 3928]
- [x86 oprofile] Add support for the latest Intel processors to Oprofile
[Patch108001 Bug 3948]
- [ixgbe] Add support ixgbe-1.3.16.1 [Patch103071 Patch103072 Bug 3950]
- [dca] Add a new module dca which depend by ioat && ixgbe [Patch103070]
- [igb] Update igb driver to version 1.2.22 (Patch103080) [Bug 3954]
- [ioat] Update ioat driver to version 1.9 and support unisys
(Patch108030, Patch108030) [Bug 3956]
- [ACPICA] Fix acpi-cpufreq boot crash due to _PSD return-by-reference
[Patch108000 Bug 3957]
- [e1000e] Update e1000e to v7.6.15 with replace Patch files
(Patch103042, Patch103043, Patch103044, Patch103045, Patch103047,
Patch103048, Patch103049) [Bug 4055]
- [comptemp] Add support coretemp driver for hwmon using a snapshot of
torvalds/linux-2.6.git (Patch108010) [Bug 4071]
- [it87] Add IT8716F/IT8718F/IT8726F support (Patch108020) [Bug 4072]
- [ocfs2] Update ocfs2 driver to version 1.2.8-2 (Patch103051) [Bug 4073]
- [PCI IDS] Update pci_ids
HT1000 [Patch104001 ~ Patch104002]
MCP67/73/77 [Patch104003 ~ Patch104006]
VIA VT8237S [Patch104007]
INTEL TOLAPAI [Patch104008 ~ Patch104009]
BCM82XX [Patch104010 ~ Patch104014]
- [KAHO] Add KAHO runtime binary patch function (Patch300001, bug#4019)
- [MAZE] Add MAZE Monitoring function (Patch300002, bug#4025)
- [SCTP] Upgrade of based codes to 2.6.21 of stock kernel
and bug fix for AXS3SP1 (Patch300003, bug#4027)
- Build Base Kernel For Asianux
- Merge patches from AX20 SP2
- [Patches 100100 100101 100200 100201 102030 102031 102040 102050 103000
- 103002 103060]
- Merge patches from AXS3
- [Patches 100102 100104 100105 100110 100111 100112 100114 100115 100300
- 102011 102012 102014 102015 102020 102021 102022 102023 102024 102051
- 102052 102500 102501 102600 102601 103004 103005 103006 103007 103010
- 103011 103012 103013 103014 103015 103018 103019 103020 103021 103022
- 103023 103031 103032 103034 103039 103040 103041 103042 103043 103044
- 103045 103046 103047 103048 103049 103050 103052 103053 103056 103057
- 103059 103061 103062 200000 200001 200002 200003 200004 200005 200006
- 200007 200011]
- [GFS2] handle multiple demote requests
- [scsi] megaraid_sas: kabi fix for /proc entries
- [sound] allow creation of null parent devices
- [net] iwlwifi: avoid BUG_ON in tx cmd queue processing
- [GFS2] Get super block a different way
- [GFS2] dlm: schedule during recovery loops
- Revert: [pata] IDE (siimage) panics when DRAC4 reset
- Revert: [net] bonding: convert timers to workqueues
- [pata] enable IDE (siimage) DRAC4
- [GFS2] gfs2_writepage(s) workaround
- [scsi] aacraid: Missing ioctl() permission checks {CVE-2007-4308}
- [GFS2] Solve journaling/{release|invalidate}page issues
- [x86_64] syscall vulnerability CVE-2007-4573}
- [GFS2] Fix i_cache stale entry
- [GFS2] deadlock running revolver load with lock_nolock
Update Packages.
The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system call, a different vulnerability than CVE-2008-0009 and CVE-2008-0010.
Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died.
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.
The iwl_set_rate function in compatible/iwl3945-base.c in iwlwifi 1.1.21 and earlier dereferences an iwl_get_hw_mode return value without checking for NULL, which might allow remote attackers to cause a denial of service (kernel panic) via unspecified vectors during module initialization.
The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
From Asianux Server 3 SP1 updated packages.
SRPMS
- kernel-2.6.18-53.11AXS3.src.rpm
MD5: a6e13bd8235c532eb848d2ce0ab86d26
SHA-256: 3b4f5c32e753a07d0c77733edaf24911c434d702535f7e46f5b7b84b4d9ecdca
Size: 53.69 MB
Asianux Server 3 for x86
- kernel-2.6.18-53.11AXS3.i686.rpm
MD5: ef18f690bf9bf67b6d64921f9210eedb
SHA-256: fdefcae67c0751d0d6f93be867eb23c51a6cfdcfb0637c06148865b90aced559
Size: 13.51 MB - kernel-devel-2.6.18-53.11AXS3.i686.rpm
MD5: 2780525646ed265e44f0566c88e0d2ec
SHA-256: 623f3dbf06f8fff33e6baf7564262e369e9138439973ae03550487354788d8d8
Size: 4.87 MB - kernel-PAE-2.6.18-53.11AXS3.i686.rpm
MD5: fb6f18fb9337fc697a5041214597dcbe
SHA-256: 4ccddeb32d48acf1e115c58e396cc002e8fc4358359e663d5cddb1b40096c4b6
Size: 13.52 MB - kernel-PAE-devel-2.6.18-53.11AXS3.i686.rpm
MD5: aa2f3ba404998887333e704f50d5e0e2
SHA-256: dc38857e8f0012a7bb35f66f230ccab5b519afa0b5b1a191c056f0ca3e4ec5ec
Size: 4.88 MB - kernel-xen-2.6.18-53.11AXS3.i686.rpm
MD5: 07861e4d7003ef48e13d8d1f8c278dac
SHA-256: 54f2fc7943c6ba88f447d05d14415ee7b5de95b5d2368f257a57b9528290e05c
Size: 14.47 MB - kernel-xen-devel-2.6.18-53.11AXS3.i686.rpm
MD5: de1ee4861bc42892c7e3d4dc9b1e744b
SHA-256: 2ffcacb0d3f3d567131497d3a931b138a779d25ce04ceb0a85b2844edd0fa00c
Size: 4.87 MB - kernel-doc-2.6.18-53.11AXS3.noarch.rpm
MD5: 5230d99c31b008f9e727400c403a34c4
SHA-256: 409c68260148cd45ce56ed414b936af4cfad5d752df82c603ead8ecea09da78b
Size: 2.82 MB - kernel-headers-2.6.18-53.11AXS3.i386.rpm
MD5: 4b139d67215f527773e9dff677c11d9e
SHA-256: b3053b0f97ea932bb0c44fae23df76efa91deb8c8199c0f1f73e0afac41f76d8
Size: 800.49 kB
Asianux Server 3 for x86_64
- kernel-2.6.18-53.11AXS3.x86_64.rpm
MD5: 350c11a9bd5cb442b9ac974fe5555d79
SHA-256: 4578ed5d3a2664a040a3515d125ccc580968190751fe3e230d75dc06293843fe
Size: 15.68 MB - kernel-devel-2.6.18-53.11AXS3.x86_64.rpm
MD5: 9fe8737c78fc9ad6029381c5194f9e9f
SHA-256: 5cc525072de81b1808389794f70ed703364c92060e5500ae2098bb0944862831
Size: 5.05 MB - kernel-headers-2.6.18-53.11AXS3.x86_64.rpm
MD5: 7d77c594ee2485f0929d024e75e47267
SHA-256: bc24c09e4f035de63073884636beba5a895b209b191b2367c5e103960a0cc7bf
Size: 838.94 kB - kernel-xen-2.6.18-53.11AXS3.x86_64.rpm
MD5: cc917b7ddcdab4b4bba3b26136e9ea7b
SHA-256: fdd4c69486b6244474afaacccb2c59f5bf20225cb9425ba0eb7dd7bdae41cc05
Size: 16.34 MB - kernel-xen-devel-2.6.18-53.11AXS3.x86_64.rpm
MD5: 1a814e27db299a52e5339f676018f052
SHA-256: bedb9acb49659401bd4b66887057b794bfa3d33c34e67d3c9c27a6a56657b722
Size: 5.06 MB - kernel-doc-2.6.18-53.11AXS3.noarch.rpm
MD5: 88c9291392a6ca16e412b61a708dfebf
SHA-256: 99e6976aa2fd54d7952c36f6f85e5747a298c1496e50bf148f19a7e2f1cc983b
Size: 2.82 MB