kernel-2.6.32-642.4.2.el6

エラータID: AXSA:2016-679:07

Release date: 
Tuesday, September 20, 2016 - 12:24
Subject: 
kernel-2.6.32-642.4.2.el6
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2016-5696
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack.

Fixed bugs:

* When loading the Direct Rendering Manager (DRM) kernel module, the kernel panicked if DRM was previously unloaded. The kernel panic was caused by a memory leak of the ID Resolver (IDR2). With this update, IDR2 is loaded during kernel boot, and the kernel panic no longer occurs in the described scenario.
* When more than one process attempted to use the "configfs" directory entry at the same time, a kernel panic in some cases occurred. With this update, a race condition between a directory entry and a lookup operation has been fixed. As a result, the kernel no longer panics in the described scenario.
* When shutting down the system by running the halt -p command, a kernel panic occurred due to a conflict between the kernel offlining CPUs and the sched command, which used the sched group and the sched domain data without first checking the data. The underlying source code has been fixed by adding a check to avoid the conflict. As a result, the described scenario no longer results in a kernel panic.
* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario.
* Previously, multiple Very Secure FTP daemon (vsftpd) processes on a directory with a large number of files led to a high contention rate on each inode's spinlock, which caused excessive CPU usage. With this update, a spinlock to protect a single memory-to-memory copy has been removed from the ext4_getattr() function. As a result, system CPU usage has been reduced and is no longer excessive in the described situation.
* When the gfs2_grow utility is used to extend Global File System 2 (GFS2), the next block allocation causes the GFS2 kernel module to re-read its resource group index. If multiple processes in the GFS2 module raced to do the same thing, one process sometimes overwrote a valid object pointer with an invalid pointer, which caused either a kernel panic or a file system corruption. This update ensures that the resource group object pointer is not overwritten. As a result, neither kernel panic nor file system corruption occur in the described scenario.
* Previously, the SCSI Remote Protocol over InfiniBand (IB-SRP) was disabled due to a bug in the srp_queue() function. As a consequence, an attempt to enable the Remote Direct Memory Access (RDMA) at boot caused the kernel to crash. With this update, srp_queue() has been fixed, and the system now boots as expected when RDMA is enabled.

Enhancements:

* This update optimizes the efficiency of the Transmission Control Protocol (TCP) when the peer is using a window under 537 bytes in size. As a result, devices that use maximum segment size (MSS) of 536 bytes or fewer will experience improved network performance.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-2.6.32-642.4.2.el6.src.rpm
    MD5: b3d7985b870545811e2febdb08411ab3
    SHA-256: 4c9efcecbbdbc31d09eab67ac730a4485708767adaf7fbfa2ad6d8dbbde8dff2
    Size: 127.31 MB

Asianux Server 4 for x86
  1. kernel-2.6.32-642.4.2.el6.i686.rpm
    MD5: 3a0621760701400af7de736a650f87ca
    SHA-256: 8f2df4e59348501c701da20c85f1a060c0c630c3dec4523f420ada20dfd488fc
    Size: 29.54 MB
  2. kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm
    MD5: 89ab859e153b4494178991e0bf53f313
    SHA-256: 99bcc18b6f0442d52bdc8effb83abed6a1e2f916769c272a433b423de3222238
    Size: 3.63 MB
  3. kernel-debug-2.6.32-642.4.2.el6.i686.rpm
    MD5: d58d4cb117535d7529b081cc0955a0ef
    SHA-256: 3aa2384ec21a541090c64ed7738ca858c55a373fcd80a0691767de07cb87000b
    Size: 30.33 MB
  4. kernel-debug-devel-2.6.32-642.4.2.el6.i686.rpm
    MD5: 2e930b0a19510bd232e83d85a98702f2
    SHA-256: 0544e432849d4024215c2147bc0efa88543c083d0026b8c4e400194d27783fcf
    Size: 10.58 MB
  5. kernel-devel-2.6.32-642.4.2.el6.i686.rpm
    MD5: 0c9f3af5491af25f62bb2e5bbcb0b3d4
    SHA-256: b5fc5224fd3f95d591442b794a8e54d68fa1984dabd7ea56e15b6fe1987e5642
    Size: 10.54 MB
  6. kernel-doc-2.6.32-642.4.2.el6.noarch.rpm
    MD5: 4da8d94bb35761392fa176045a6c7be3
    SHA-256: a8ecc5e0e3311306897558e744a16b98fab3143495f069d8f50aaa2cb2cd4cd9
    Size: 12.20 MB
  7. kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm
    MD5: c006f71d07f07f15916f7520d425f015
    SHA-256: 36fc4fa63dbbf9a200981e3ae6ab8a93b26e273b3b13fb4a8af8ef14dbd4b7dc
    Size: 28.06 MB
  8. kernel-headers-2.6.32-642.4.2.el6.i686.rpm
    MD5: f0ab74a2a085d96ac59bebbdb8c5c644
    SHA-256: bb0db24ff258b1d0e0e588d873e3c6607a5f0a652bc5835e74bc3e8d614c032d
    Size: 4.35 MB
  9. perf-2.6.32-642.4.2.el6.i686.rpm
    MD5: 9c6dcf374fdd1b0cb4213b4de936914a
    SHA-256: c7710131ae43d76e5b94b816a58b5bb9445dcb256e531d1f9819b931f9226f6c
    Size: 4.58 MB

Asianux Server 4 for x86_64
  1. kernel-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: af984d14b9b238184efea9031cd7a93a
    SHA-256: 2adf4dda1bf17878901ea71921b12199a66c319764ccf839fc7ace65b1edb8e9
    Size: 31.84 MB
  2. kernel-abi-whitelists-2.6.32-642.4.2.el6.noarch.rpm
    MD5: 6e5976e59d7c79ab0f3475380ebaef7f
    SHA-256: 088e4ece6902c8818b8b3fdfe218e6e423aaa2ebd2530205bf7fd57fbefbb959
    Size: 3.63 MB
  3. kernel-debug-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: de10a4c8049f03089a41959ea714f050
    SHA-256: 430466daf9c9af696de1042e51a3dd248eee97b740494fd2d4960c2d609acae2
    Size: 32.72 MB
  4. kernel-debug-devel-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: 925bf27651dcb503eea4d3a5bf4268df
    SHA-256: a3e187185afe42a8e4cc734713f2c7afb58a5f584fc13c7a03d62d9a7dab4956
    Size: 10.63 MB
  5. kernel-devel-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: cd00fcec6586a4caa4612577c7265f9a
    SHA-256: 528d0ec103c74f24263af148b80e2de5def444c15a6b1c5d4cfd9d48cd4c44a6
    Size: 10.59 MB
  6. kernel-doc-2.6.32-642.4.2.el6.noarch.rpm
    MD5: 8719a93491355e5ff41853bacb3b35e6
    SHA-256: e66610b1fdca75829a961c36e1a5044b35d29163be10c9bf622e1185338c7b45
    Size: 12.20 MB
  7. kernel-firmware-2.6.32-642.4.2.el6.noarch.rpm
    MD5: a74c6d8db9828e747af91550c9684a30
    SHA-256: 172abfe18d70827c2d8038ac76901bd2eaea8fee4281e346748ece462091256c
    Size: 28.06 MB
  8. kernel-headers-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: 306b355477884fd147088aa5b6674777
    SHA-256: 5becc6699f1d5b7e477534f380ef1584e8fd469007bc25cd7b7e43c1fff1b410
    Size: 4.35 MB
  9. perf-2.6.32-642.4.2.el6.x86_64.rpm
    MD5: 11ef75d7bb68cddf492c184e8d8d7fcc
    SHA-256: 367447e2354e4289e90f9f33226d71a3c5c2116daec064d53eb0e8030dbb96a5
    Size: 4.55 MB