kernel-2.6.18-348.1.AXS3
エラータID: AXSA:2013-80:01
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Security issues fixed with this release:
• CVE-2012-2372
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
• CVE-2012-3552
The IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
• CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
• CVE-2012-4535
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
• CVE-2012-4537
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
• CVE-2012-5513
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Fixed bugs:
• Modified the qla2xxx driver so that it now correctly detects all attached LUNs.
• The Media Independent Interfacestatus of the bond interface in 802.3ad appeared as up even when MII status of all of the slave devices was down. This has been fixed.
Enhancements:
• Backported many changes from the bnx2x driver upstream version, in particular, the remote-fault link detection feature.
• The INET socket interface now sends a warning when a third-party module using the kmalloc() function allocates the ip_options structure.
Please also check the changelog for extensive details.
Update packages.
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
N/A
SRPMS
- kernel-2.6.18-348.1.AXS3.src.rpm
MD5: c5d3605b6dda118e913d5ca51964b387
SHA-256: b9a700c6365046bad54e5989364f87c96f6157660e6323dac2dcda33042c360f
Size: 65.82 MB
Asianux Server 3 for x86
- kernel-2.6.18-348.1.AXS3.i686.rpm
MD5: d0761575694a3e651064b4cf6b12b9ff
SHA-256: 7a832ee86e03fd193d118c191c405f61611506a413a63bb8d241b7b5c3f4565d
Size: 19.79 MB - kernel-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: 35358a5a8fa872016b335455238ce614
SHA-256: 998e447adbcfd6311865819bf0495df480b3d81e276b0b03b489ff0f12bf4d47
Size: 6.04 MB - kernel-doc-2.6.18-348.1.AXS3.noarch.rpm
MD5: 853d7c04e0fe9ec852857921f2024b7f
SHA-256: 00b541eb546b0337328d6a4f218ba9a62930f5412ad11f0e46f7dff194441047
Size: 3.47 MB - kernel-headers-2.6.18-348.1.AXS3.i386.rpm
MD5: ebb7c6f604c91f9fdab75d58eaa9c88b
SHA-256: dfbc568295e89d0bfe85e93c08a9e084e61691c0b8fc048a24b5388ad8250482
Size: 1.44 MB - kernel-PAE-2.6.18-348.1.AXS3.i686.rpm
MD5: 367ac8832fa9f3c847c39d066d908ef6
SHA-256: 0af1e3e07749a09aad54560a81e453c4c67fb6dec7d3bc2417cb826b59e16782
Size: 19.81 MB - kernel-PAE-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: c15c5be30d75a4b988159e258f25ce49
SHA-256: 436b43d836720767510e06f619ebd44fa64237f5ec2dd66998d33c4cb0256010
Size: 6.05 MB - kernel-xen-2.6.18-348.1.AXS3.i686.rpm
MD5: 6c5ab78b7bdb3f216de88ae2af2e2c4b
SHA-256: a43e1b2463b906c427997946f73ea3e9eebc14f217c02eaae26f4635421324c8
Size: 20.90 MB - kernel-xen-devel-2.6.18-348.1.AXS3.i686.rpm
MD5: 6f03f6eac7567864dae3e8336cf3e42a
SHA-256: dd10f7daf4c586fd1d7700fd13413e0edfa421cc5bb7c1788a9078ae9751a990
Size: 6.05 MB
Asianux Server 3 for x86_64
- kernel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 32a2759fe7ad3ba5c24d07d144007860
SHA-256: e6d952a4a9ff63137edfdffd96f1a790a64a4ecd283cd646e661ad33d4ecf4ca
Size: 22.10 MB - kernel-devel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: c48ed8a4af679b071c26ca8bf2855f1c
SHA-256: 7a8befcdb5024e25ce3ce366229a518f615b0ebdcbe70c51795394a8349f2178
Size: 6.04 MB - kernel-doc-2.6.18-348.1.AXS3.noarch.rpm
MD5: 2f56444f300df98c506d6df135c128af
SHA-256: fa5187cec106fa3d8d7f052ca1ff60adb604d3aa53892637f42455f7bda33b8d
Size: 3.47 MB - kernel-headers-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 4736595ad8ce9745d38fa008e2f0bcef
SHA-256: 3e42ef7c68af94071b411277144ab1ede766a703d0cce0be2723f7f2af87be09
Size: 1.48 MB - kernel-xen-2.6.18-348.1.AXS3.x86_64.rpm
MD5: 065d9c51a30141f5b9fc8717609ad3d6
SHA-256: 55500f017736c9c67218d3671d242ff7ff3add668178ebb7686645c1b383ce4e
Size: 22.96 MB - kernel-xen-devel-2.6.18-348.1.AXS3.x86_64.rpm
MD5: d8f90036872c5fc5a19608a1268ffd12
SHA-256: 5983843d13b0b68350e9962a6e332d989d9e4d6b67075f599a09b13fbfa67989
Size: 6.05 MB