kernel-3.10.0-327.28.2.el7

エラータID: AXSA:2016-647:05

Release date: 
Wednesday, August 31, 2016 - 16:34
Subject: 
kernel-3.10.0-327.28.2.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2015-8660
The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel
through 4.3.3 attempts to merge distinct setattr operations, which
allows local users to bypass intended access restrictions and modify
the attributes of arbitrary overlay files via a crafted application.
CVE-2016-2143
The fork implementation in the Linux kernel before 4.5 on s390
platforms mishandles the case of four page-table levels, which allows
local users to cause a denial of service (system crash) or possibly
have unspecified other impact via a crafted application, related to
arch/s390/include/asm/mmu_context.h and
arch/s390/include/asm/pgalloc.h.
CVE-2016-4470
The key_reject_and_link function in security/keys/key.c in the Linux
kernel through 4.6.3 does not ensure that a certain data structure is
initialized, which allows local users to cause a denial of service
(system crash) via vectors involving a crafted keyctl request2
command.

Fixed bugs:

* The glibc headers and the Linux headers share certain definitions of key structures that are required to be defined in kernel and in userspace. In some instances both userspace and sanitized kernel headers have to be included in order to get the structure definitions required by the user program. Unfortunately because the glibc and Linux headers don't coordinate this can result in compilation errors. The glibc headers have therefore been fixed to coordinate with Linux UAPI-based headers. With the header coordination compilation errors no longer occur.
* When running the TCP/IPv6 traffic over the mlx4_en networking interface on the big endian architectures, call traces reporting about a "hw csum failure" could occur. With this update, the mlx4_en driver has been fixed by correction of the checksum calculation for the big endian architectures. As a result, the call trace error no longer appears in the log messages.
* Under significant load, some applications such as logshifter could generate bursts of log messages too large for the system logger to spool. Due to a race condition, log messages from that application could then be lost even after the log volume dropped to manageable levels. This update fixes the kernel mechanism used to notify the transmitter end of the socket used by the system logger that more space is available on the receiver side, removing a race condition which previously caused the sender to stop transmitting new messages and allowing all log messages to be processed correctly.
* Previously, after heavy open or close of the Accelerator Function Unit (AFU) contexts, the interrupt packet went out and the AFU context did not see any interrupts. Consequently, a kernel panic could occur. The provided patch set fixes handling of the interrupt requests, and kernel panic no longer occurs in the described situation.
* net: recvfrom would fail on short buffer.
These updated kernel packages include several security issues and numerous bug fixes, some of which you can see below.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-327.28.2.el7.src.rpm
    MD5: 1fb90dc2b01592e31af862542a481678
    SHA-256: 6c8683edf83ade1106d7336d039e57ee077d4efbce6ddbb11deb1ffe3a80b555
    Size: 79.23 MB

Asianux Server 7 for x86_64
  1. kernel-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: dafa073cf1283b752702666da34de730
    SHA-256: d1b5cb98e28de1e90af0b233619a4195b053f54e2dc8ab0ecc1b91408c64616a
    Size: 33.05 MB
  2. kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm
    MD5: eb6c4f3cf0a7304baf9abfecb03ffc74
    SHA-256: 5daaa05641976bd25c75cb38768cfd4597891d96539bd6a01cd97d23bd91f71b
    Size: 2.33 MB
  3. kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: d6508c95da4e4b831063031c014f8b77
    SHA-256: 77e6f0510bd0cef78b03ce381684c8387fd3309b6c97450cbed591a09a00cfa8
    Size: 34.67 MB
  4. kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: c1e8425786b137c0b865021ba766bf2c
    SHA-256: bd1d1f45025452d1ece3ec6b99c0bccfe4ad9d844129ceecb02c65bd5187e7a8
    Size: 11.05 MB
  5. kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: 6fd66d08dbab12fff043953016b7be84
    SHA-256: 887517dc127e5d5aeb6992251eaa68c34d9f3aaf5aca42a0979d9eebfa5816bd
    Size: 10.98 MB
  6. kernel-doc-3.10.0-327.28.2.el7.noarch.rpm
    MD5: df6c68bc438a9743e626bc931cc691ce
    SHA-256: affe1ba34c5b66c65e09255a7f4b0a3becb5b13dd30aff3b46307296c328cb3e
    Size: 13.45 MB
  7. kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: 320345efac23f98ec4ba79b51818e7c9
    SHA-256: 8973134bcad6578f37371471e8590290cc11832737e2eabfb57ee9b2940e39de
    Size: 3.20 MB
  8. kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: ae6f5569781ab3275147b18d69147f2d
    SHA-256: 41c363edcbc6972c5cdba1ad0fad49cc52b3c20a4d75461a8fa01abdd2d7401a
    Size: 2.41 MB
  9. kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: 52125c25c1108c2d0a5e8b1e9530cb1e
    SHA-256: 307a2b3613dd3154ab1cd78f5d6442dfb11dcbc9a66feb44731f0bf67d0e6e88
    Size: 2.33 MB
  10. perf-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: 7d113a2e523a77986d45548ab7d526ec
    SHA-256: 46ee5843d5a6ada661e4f263ffce59d2560cf8f54c54e6d05354b273f8be0688
    Size: 3.33 MB
  11. python-perf-3.10.0-327.28.2.el7.x86_64.rpm
    MD5: 859cf4bc0e9aee9fa087e2edce7a7a8b
    SHA-256: 75cc6a173b9f14705ea514312fe2afcf3e21b8a21b635c98a5ae890ab650564f
    Size: 2.41 MB