kernel-3.10.0-327.3.1.el7

エラータID: AXSA:2015-969:06

Release date: 
Tuesday, December 29, 2015 - 16:18
Subject: 
kernel-3.10.0-327.3.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2015-5307
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service
(host OS panic or hang) by triggering many #AC (aka Alignment Check)
exceptions, related to svm.c and vmx.c.
CVE-2015-8104
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x
through 4.6.x, allows guest OS users to cause a denial of service
(host OS panic or hang) by triggering many #DB (aka Debug) exceptions,
related to svm.c.

Fixed bugs:

* On Intel Xeon v5 platforms, the processor frequency was always tied to the highest possible frequency. Switching p-states on these client platforms failed. This update sets the idle frequency, busy frequency, and processor frequency values by determining the range and adjusting the minimal and maximal percent limit values. Now, switching p-states on the aforementioned client platforms proceeds successfully.
* Due to a validation error of in-kernel memory-mapped I/O (MMIO) tracing, a VM became previously unresponsive when connected to Red Hat Enterprise Virtualization Hypervisor. The provided patch fixes this bug by dropping the check in MMIO handler, and a VM continues running as expected.
* Due to retry-able command errors, the NVMe driver previously leaked I/O descriptors and DMA mappings. As a consequence, the kernel could become unresponsive during the hot-unplug operation if a driver was removed. This update fixes the driver memory leak bug on command retries, and the kernel no longer hangs in this situation.
* The hybrid_dma_data() function was not initialized before use, which caused an invalid memory access when hot-plugging a PCI card. As a consequence, a kernel oops occurred. The provided patch makes sure hybrid_dma_data() is initialized before use, and the kernel oops no longer occurs in this situation.
* When running PowerPC (PPC) KVM guests and the host was experiencing a lot of page faults, for example because it was running low on memory, the host sometimes triggered an incorrect kind of interrupt in the guest: a data storage exception instead of a data segment exception. This caused a kernel panic of the PPC KVM guest. With this update, the host kernel synthesizes a segment fault if the corresponding Segment Lookaside Buffer (SLB) lookup fails, which prevents the kernel panic from occurring.
* The kernel accessed an incorrect area of the khugepaged process causing Logical Partitioning (LPAR) to become unresponsive, and an oops occurred in medlp5. The backported upstream patch prevents an LPAR hang, and the oops no longer occurs.
* When the sctp module was loaded and a route to an association endpoint was removed after receiving an Out-of-The-Blue (OOTB) chunk but before incrementing the "dropped because of missing route" SNMP statistic, a Null Pointer Dereference kernel panic previously occurred. This update fixes the race condition between OOTB response and route removal.
* The cpuscaling test of the certification test suite previously failed due to a rounding bug in the intel-pstate driver. This bug has been fixed and the cpuscaling test now passes.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-327.3.1.el7.src.rpm
    MD5: e973b734b2a51b6961e29b394a5a7775
    SHA-256: 54751ff13d2d7de5e454a68bc70e359f84c0ce18a441fbd86178607c21a0bee8
    Size: 79.19 MB

Asianux Server 7 for x86_64
  1. kernel-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: 8ac4640bbf2385ada715cbeac040619a
    SHA-256: ce3977620f3fd24c72133c82f18fba4c233b13ef07de42e06ad17d4cf40c625d
    Size: 33.02 MB
  2. kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm
    MD5: ca06c12a22946511f9ae9c5ba426c5ed
    SHA-256: 0b24978a812afdbe3966517b638f68fe713fb501d0e0829e393a3a088691b573
    Size: 2.31 MB
  3. kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: a219831e08574a207ee066453542cebc
    SHA-256: 9e6905b8f51f4990c6da57f62edb02494016085276019345114a0768c457e77b
    Size: 34.64 MB
  4. kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: db1ea894b28dadd1d43c770bf32715d3
    SHA-256: 2c7412f958fb636233ddcee4098bf9fc20e916fc6c331004cd129d9ac97d8b1b
    Size: 11.02 MB
  5. kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: 86f01955ebdbc2bf5b85834c8d2faf85
    SHA-256: d61ac0ca13d66ef76c53d30cf04cbe7639aa1b01ae665baf311f289459d43f82
    Size: 10.96 MB
  6. kernel-doc-3.10.0-327.3.1.el7.noarch.rpm
    MD5: f431fcf791c8df21da15788ee5056c34
    SHA-256: ce9a0364ddea1d68054d9a81c65588e811dbe9142d306dbf8e21e17073111ccd
    Size: 13.41 MB
  7. kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: 1e41a0eca8589e70067c62decc2e0059
    SHA-256: c9b3e6a3c89f724c40fba8702843c25bb68968b1263499850871ad603b13d92d
    Size: 3.17 MB
  8. kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: a524115084cc4f5036ba7251d301d993
    SHA-256: 8de4687738b28f58c3b4ce7a41c45202d5f8ad8bdc9cec862625bea3822d3c47
    Size: 2.39 MB
  9. kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: 263258acef7d9eef2eb449f47018dcd3
    SHA-256: 0e16a6fae15b348b4da433d1fbb5a95e36e4df25911e80c3e1d4945a84ea4948
    Size: 2.31 MB
  10. perf-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: cfa5f73532714f0328ffd032e28cbacd
    SHA-256: 167373d46778af88297b7395feade3926435083982aca98e7ccccd2108a5479e
    Size: 3.31 MB
  11. python-perf-3.10.0-327.3.1.el7.x86_64.rpm
    MD5: 92fe981d205bd73faaa0bea7d0912990
    SHA-256: 71e1c39ddbb831459693b14a7803210ebd5bfa9e1f877fc1a997e261fed26e38
    Size: 2.38 MB