kernel-3.10.0-229.14.1.el7

エラータID: AXSA:2015-504:03

Release date: 
Wednesday, September 30, 2015 - 12:24
Subject: 
kernel-3.10.0-229.14.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2014-9585
The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel
through 3.18.2 does not properly choose memory locations for the vDSO
area, which makes it easier for local users to bypass the ASLR
protection mechanism by guessing a location at the end of a PMD.
CVE-2015-0275
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.
CVE-2015-1333
Memory leak in the __key_link_end function in security/keys/keyring.c
in the Linux kernel before 4.1.4 allows local users to cause a denial
of service (memory consumption) via many add_key system calls that
refer to existing keys.
CVE-2015-3212
Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2
allows local users to cause a denial of service (list corruption and
panic) via a rapid series of system calls related to sockets, as
demonstrated by setsockopt calls.
CVE-2015-4700
The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the
Linux kernel before 4.0.6 allows local users to cause a denial of
service (system crash) by creating a packet filter and then loading
crafted BPF instructions that trigger late convergence by the JIT
compiler.
CVE-2015-5364
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux
kernel before 4.0.6 do not properly consider yielding a processor,
which allows remote attackers to cause a denial of service (system
hang) via incorrect checksums within a UDP packet flood.
CVE-2015-5366
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux
kernel before 4.0.6 provide inappropriate -EAGAIN return values, which
allows remote attackers to cause a denial of service (EPOLLET epoll
application read outage) via an incorrect checksum in a UDP packet, a
different vulnerability than CVE-2015-5364.

Fixed bugs:

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-229.14.1.el7.src.rpm
    MD5: 33108810de131de8c39649ef90c6a75b
    SHA-256: bd57fc4edb30e1b20d1932843c48285bfded95dc08a10547dbc9de337b852d09
    Size: 76.44 MB

Asianux Server 7 for x86_64
  1. kernel-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 402f13320bf2906a1d69cb0a623ba8f0
    SHA-256: 5fc88c48a555a41ad797b15285697028b2a5fd2ee82e94d1b1c5c6f6a084fdd8
    Size: 30.92 MB
  2. kernel-abi-whitelists-3.10.0-229.14.1.el7.noarch.rpm
    MD5: 2f066dffe4194c1149bcb99ae95b6152
    SHA-256: d7ef7224b490b1c28af9b85428d877e2129db1a402b189b84c0ad0de86d47e1f
    Size: 1.44 MB
  3. kernel-debug-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 3dbf334eb349b8e560b1041d193fe0f4
    SHA-256: 4f32cb84be882430ffdeed58b96463acd444fe1758d201f764c853db2cec7374
    Size: 32.47 MB
  4. kernel-debug-devel-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 22966a33357b19560e8eba939b9a028a
    SHA-256: a3903047a8ed32246bdd4d7d5ddee074c6921e7a6f632a078e1104d191bfa745
    Size: 9.95 MB
  5. kernel-devel-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 4c11f7975feacc461bc57786f2fd77c4
    SHA-256: a251896afc973a34cec534c0a3001c1f3179bfc91771e7211d94e77c45b05526
    Size: 9.90 MB
  6. kernel-doc-3.10.0-229.14.1.el7.noarch.rpm
    MD5: fd731e9ce56231ed467b3c689da86be5
    SHA-256: 1a15cc7415f6934cd8f0ea8ba8fd9a92c672728a6ff2efe169c235d2703d771c
    Size: 12.56 MB
  7. kernel-headers-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 530a3878cddc744e19ba76c8fe7743eb
    SHA-256: 7a5a39e979f7d84c9cf41a11d99635afa38906bef91a7ba1163b8118eee9843a
    Size: 2.29 MB
  8. kernel-tools-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: abe335b111c061fa739a7a7afda6d15a
    SHA-256: e05085b0c6b06086f4bc41c90753d33c72096ecfde1e3c7cb0985f11f99297d3
    Size: 1.52 MB
  9. kernel-tools-libs-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 644641ca01637da4fff0ec1577c95379
    SHA-256: d781e3c8f39d30c2048474d4afcd122f205eff2a1011f168c811504303c392ee
    Size: 1.44 MB
  10. perf-3.10.0-229.14.1.el7.x86_64.rpm
    MD5: 19a62b3b19c23bf18c9930d655ed0d00
    SHA-256: f81edf4c6a6a3476ceec147d6d66f0759a1dcc148eaa9ac28eeb1b6ed59e7b2a
    Size: 2.37 MB