kernel-3.10.0-1160.15.2.el7

エラータID: AXSA:2021-1471:03

Release date: 
Saturday, February 13, 2021 - 10:42
Subject: 
kernel-3.10.0-1160.15.2.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
Moderate
Description: 

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

* kernel: use-after-free in fs/block_dev.c (CVE-2020-15436)

* kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* double free issue in filelayout_alloc_commit_info

* Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7

* Openstack network node reports unregister_netdevice: waiting for qr-3cec0c92-9a to become free. Usage count = 1

* dlm: add ability to interrupt waiting for acquire POSIX lock

* [Azure] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance

* Guest crashed when hotplug vcpus on booting kernel stage

* soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock.

* [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate

* [Hyper-V] Request to included a commit that adds a timeout to vmbus_wait_for_unload

* Unable to discover the LUNs from new storage port

* Kernel panic at ceph_put_snap_realm+0x21

* A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns().

* ethtool/mlx5_core provides incorrect SFP module info

* zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl

* s390/dasd: Fix zero write for FBA devices

* [Azure]IP forwarding issue in netvsc[7.9.z]

* Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels

Enhancement(s):

* RFE : handle better ERRbaduid on SMB1

CVE-2020-15436
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
CVE-2020-25212
A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
CVE-2020-35513
A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-1160.15.2.el7.src.rpm
    MD5: 046d1bf3e83a9d512bca53ba09f5fc38
    SHA-256: 1d4e27eee9c92993675685bbdabc74fe673edb014d94fc0f853154236d3a1db3
    Size: 99.94 MB

Asianux Server 7 for x86_64
  1. bpftool-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 30ba2d7f128e8e147aa2b79f7d3c6cc0
    SHA-256: 7d6b758f1c53d96508da4f6156e3810697a34a89a619eca0d7012d45fe997ef1
    Size: 8.47 MB
  2. kernel-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 52f22800f3d225af93fc61a435ea3614
    SHA-256: dfd19d0a7fbe82290fb8c4c81994df74e7244eac7a4b183743315f42d5c23fb9
    Size: 50.31 MB
  3. kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm
    MD5: 036f98d9da9b5aa30c82044a53fed042
    SHA-256: f30733b6f779696c643dc9b2cd70d7a7f2f3b93dc3fb6d6b56b3568ee6a6d5a2
    Size: 8.04 MB
  4. kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: bf6e9d768bd17029be2dd15516098830
    SHA-256: 910bc1b8b5feda618cfe52d98609a8495e1c54b0122effb6a8b0822c69c9a6fe
    Size: 52.61 MB
  5. kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: acb820ce4a928c683fce8b9b32203c4c
    SHA-256: a010a0ebaada29b33b23c567d0cdfe9f5aa053873db08706473e4d8ce5d6f54d
    Size: 18.02 MB
  6. kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 2be90479c8f4e2e5af8fbe5680dc75b8
    SHA-256: 0a582839e36aff0bb6bc9eb3ae2eb5567c8a7659ccfe0752c63c118854eda437
    Size: 17.95 MB
  7. kernel-doc-3.10.0-1160.15.2.el7.noarch.rpm
    MD5: 5846c854d43aeae58e0aefa634c6447d
    SHA-256: c73b368626f8d098d018f77e2e8e4e0a9df65e8b766dcd07adfd4d3f495177f8
    Size: 19.50 MB
  8. kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: e2fb6e9be8285d87d7c90942fa938868
    SHA-256: deac54a5c9de5eaab19ac8bda9b87ad7d8ded5064a4f3249aafa7abf55563cd6
    Size: 9.02 MB
  9. kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 7a459c2979749a0141364070eccd4692
    SHA-256: 7a0bc9648e973ae3ce68347f23fb6ec6049a1d9efd585a3e697db3adba00ae98
    Size: 8.13 MB
  10. kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 70f83b5f61b28549175955fe9989fca3
    SHA-256: 4a4a13e0f80c2c68938acd4c2b06e55dcc25f550cbb20cfb3a9800f8ce3a7ec0
    Size: 8.03 MB
  11. perf-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 4894b944781821a626518a1969c3200a
    SHA-256: 611bfb489e73fe7dd1cb0431a3da7ac4ce3563f21f80312dc79fb5f9399deee6
    Size: 9.67 MB
  12. python-perf-3.10.0-1160.15.2.el7.x86_64.rpm
    MD5: 8490e5e4f1687177b8bc483e26d5654d
    SHA-256: 3522a6bd6accf69e69f3de1d3e2d829e0ec30bd9c112c965c6ff477c32ea0a47
    Size: 8.12 MB