kernel-3.10.0-327.36.1.el7

エラータID: AXSA:2016-707:07

Release date: 
Monday, October 17, 2016 - 18:08
Subject: 
kernel-3.10.0-327.36.1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Security issues fixed with this release:

CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not
validate certain offset fields, which allows local users to gain
privileges or cause a denial of service (heap memory corruption) via
an IPT_SO_SET_REPLACE setsockopt call.
CVE-2016-4997
The compat IPT_SO_SET_REPLACE setsockopt implementation in the
netfilter subsystem in the Linux kernel before 4.6.3 allows local
users to gain privileges or cause a denial of service (memory
corruption) by leveraging in-container root access to provide a
crafted offset value that triggers an unintended decrement.
CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter
subsystem in the Linux kernel before 4.6 allows local users to cause a
denial of service (out-of-bounds read) or possibly obtain sensitive
information from kernel heap memory by leveraging in-container root
access to provide a crafted offset value that leads to crossing a
ruleset blob boundary.

Fixed bugs:

* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario.
* Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario.
* Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected.
* Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time.
Enhancements:

* With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the "-F exe=

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. kernel-3.10.0-327.36.1.el7.src.rpm
    MD5: 64b7e9ba42b7264b51bba2fef95bb70e
    SHA-256: ee02f073c4e7486b448abb39131fb3466ff610f7f085647738c2c5319d1520f4
    Size: 79.25 MB

Asianux Server 7 for x86_64
  1. kernel-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 1583cc91a6f0989562ca126dcca35f1c
    SHA-256: bd9f96894224713675defb90150c47a89ef51bdb3b6014cd5495d9aea61aa376
    Size: 33.06 MB
  2. kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm
    MD5: f1db8412adda678485e5cc694c2235ae
    SHA-256: 20e0f0a2119d6a0d6994c0678dec6681746589b582e6382adc1694bbd6768f0f
    Size: 2.34 MB
  3. kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 722c8555399a710e9ce63ecd61ad0507
    SHA-256: 82aa66d1ae8eb91103b4e71d70d96efe78abdce32fb4b66b21fbe37b065d25da
    Size: 34.68 MB
  4. kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 4740d06cb91171bcd0618ec7413ea2be
    SHA-256: bc8938a9b481257870a6e97d187b19eb8f26d39f67929d2fe58f346a7aeca6f0
    Size: 11.06 MB
  5. kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 1a4855f6b22013545d421e0947395070
    SHA-256: 67da60e2e1d4d32c819d417a34d2e893d24fa0ce344b6dad0bcc16fcf93407e2
    Size: 10.99 MB
  6. kernel-doc-3.10.0-327.36.1.el7.noarch.rpm
    MD5: 0dc453c742a6f33e566623059625421d
    SHA-256: 6aaf3bff9b3c8f4c110a6b97804a50fe110e01120f59c8a79d47f732056e29cf
    Size: 13.44 MB
  7. kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: db1fd59bd7028a257b264dcf3fb9ef77
    SHA-256: 8b27e6dd813964eb94c2eabf4a5b8946d9568cec6c6991335c41def1fe471a33
    Size: 3.21 MB
  8. kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: f2f567bf51627f613aa73655cea1e5b5
    SHA-256: 69c65e9b4998b2e7924af5000d69dd8bd3d2357699e8aa949c187cffb32dc16d
    Size: 2.42 MB
  9. kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: eb10052fa75ac3a176f744b244914061
    SHA-256: 38b48d1e21e0667d1ef39b9dd544fdb257752befaf65c4af4a4935233d39f76e
    Size: 2.34 MB
  10. perf-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 09ede7178ccad4184178f2e3fe515634
    SHA-256: 10342826435903dc35a6a36470166d91bb9a888e83db989ddd018e470380bc6c
    Size: 3.34 MB
  11. python-perf-3.10.0-327.36.1.el7.x86_64.rpm
    MD5: 3f27192ce63a494dfc0ebc9968dc340a
    SHA-256: 332d6cc8cbc0c6e936b30ab6fc5a5c1649821428fb203a5159644e2aedbba820
    Size: 2.42 MB