kernel-2.6.32-642.13.1.el6
エラータID: AXSA:2017-1275:01
The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
Security issues fixed with this release:
CVE-2016-4998
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter
subsystem in the Linux kernel before 4.6 allows local users to cause a
denial of service (out-of-bounds read) or possibly obtain sensitive
information from kernel heap memory by leveraging in-container root
access to provide a crafted offset value that leads to crossing a
ruleset blob boundary.
CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux
kernel before 4.7.5 does not properly maintain certain SACK state
after a failed data copy, which allows local users to cause a denial
of service (tcp_xmit_retransmit_queue use-after-free and system crash)
via a crafted SACK option.
CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in
net/socket.c in the Linux kernel before 4.5.2 allows remote attackers
to execute arbitrary code via vectors involving a recvmmsg system call
that is mishandled during error processing.
Fixed bugs:
* When parallel NFS returned a file layout, a kernel crash sometimes occurred. This update removes the call to the BUG_ON() function from a code path of a client that returns the file layout. As a result, the kernel no longer crashes in the described situation.
* When a guest virtual machine (VM) on Microsoft Hyper-V was set to crash on a Nonmaskable Interrupt (NMI) that was injected from the host, this VM became unresponsive and did not create the vmcore dump file. This update applies a set of patches to the Virtual Machine Bus kernel driver (hv_vmbus) that fix this bug. As a result, the VM now first creates and saves the vmcore dump file and then reboots.
* From Asianux Server 4.6 to 6.8, the IPv6 routing cache occasionally showed incorrect values. This update fixes the DST_NOCOUNT mechanism, and the IPv6 routing cache now shows correct values.
* When using the ixgbe driver and the software Fibre Channel over Ethernet (FCoE) stack, suboptimal performance in some cases occurred on systems with a large number of CPUs. This update fixes the fc_exch_alloc() function to try all the available exchange managers in the list for an available exchange ID. This change avoids failing allocations, which previously led to the host busy status.
* When the vmwgfx kernel module loads, it overrides the boot resolution automatically. Consequently, users were not able to change the resolution by manual setting of the kernel's 'vga=' parameter in the /boot/grub/grub.conf file. This update adds the 'nomodeset' parameter, which can be set in the /boot/grub/grub.conf file. The 'nomodeset' parameter allows the users to prevent the vmwgfx driver from loading. As a result, the setting of the 'vga=' parameter works as expected, in case that vmwgfx does not load.
* When Asianux Server 4.8 was booted on SMBIOS 3.0 based systems, Desktop Management Interface (DMI) information, which is referenced by several applications, such as NEC server's memory RAS utility, was missing entries in the sysfs virtual file system. This update fixes the underlying source code, and sysfs now shows the DMI information as expected.
* Previously, bonding mode active backup and the propagation of the media access control (MAC) address to a VLAN interface did not work in Asianux Server 4.8, when the fail_over_mac bonding parameter was set to fail_over_mac=active. With this update, the underlying source code has been fixed so that the VLANs continue inheriting the MAC address of the active physical interface until the VLAN MAC address is explicitly set to any value. As a result, IPv6 EUI64 addresses for the VLAN can reflect any changes to the MAC address of the physical interface, and Duplicate Address Detection (DAD) behaves as expected.
Update packages.
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
N/A
SRPMS
- kernel-2.6.32-642.13.1.el6.src.rpm
MD5: 0eb6eba32cddf2147fbaf5872b70923b
SHA-256: 7cfe49ddefaf34ee1315f1aef0a6625f48fb6d2db01b1aa28973680fe55b5bee
Size: 127.29 MB
Asianux Server 4 for x86
- kernel-2.6.32-642.13.1.el6.i686.rpm
MD5: 886802dd616628be13e944088f383257
SHA-256: 2fde5f9b23b57fab22bc6225c5d36955289325056ff4e526a49d9641627d9369
Size: 29.55 MB - kernel-abi-whitelists-2.6.32-642.13.1.el6.noarch.rpm
MD5: 9ec9e52511103d81e0ab311c8c71e158
SHA-256: e49e380327d9adaab0072605b321dc8389ef65a2fd1c151d01cef6307537eb90
Size: 3.63 MB - kernel-debug-2.6.32-642.13.1.el6.i686.rpm
MD5: 46bfd9c16409cef55e0a7da5c001f7d6
SHA-256: 5870267305c36c177781ba1556d4524688dbe3b9123b5d1450657a655edf9ce1
Size: 30.33 MB - kernel-debug-devel-2.6.32-642.13.1.el6.i686.rpm
MD5: e8bb4728b61b4185906b6c15f44780db
SHA-256: 8c67c381a7ca894169dbab3c8c83488725e3961b5b9e5c54a356d38ea582b61e
Size: 10.59 MB - kernel-devel-2.6.32-642.13.1.el6.i686.rpm
MD5: 4db1a195041e17bcca22f63ec3211b4e
SHA-256: 8b2bb160931ca9ace1d6e7ca6fa60e71dfda459858698e8dc6ca15cb43c4c96f
Size: 10.55 MB - kernel-doc-2.6.32-642.13.1.el6.noarch.rpm
MD5: f538183a25b64c730dd22148d4543d05
SHA-256: be07d031c2f040bcd963447e47f93855bca7e918f1b5fe9aa371ab3e719662bf
Size: 12.20 MB - kernel-firmware-2.6.32-642.13.1.el6.noarch.rpm
MD5: fd55c654cd8dd28f5711ced670a984e4
SHA-256: 8bf322b08bbba9d5a80f0406c055bc5dccb125f19aa9668b947b90b719e72341
Size: 28.07 MB - kernel-headers-2.6.32-642.13.1.el6.i686.rpm
MD5: 628f8e7c32c87c8e6f1cc20275240100
SHA-256: 758f1c94cd9ab2701dd1880b36eff07a43094a5b0d4a05e08ec6f932576fb4f6
Size: 4.36 MB - perf-2.6.32-642.13.1.el6.i686.rpm
MD5: f0b9fdaadd3d790528f776ca4d60ffb4
SHA-256: 9eed4a5c77cf92d65d0e88b816c4b887871f119ff0e9b26ca80ca1f1c002e2e6
Size: 4.58 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-642.13.1.el6.x86_64.rpm
MD5: b111d24efbbfb0aad08bf0e60fae1c1b
SHA-256: 828ad024b5484a7a976beb9814260c1bd34b6b99d935be3dcbce0806936a95ba
Size: 31.85 MB - kernel-abi-whitelists-2.6.32-642.13.1.el6.noarch.rpm
MD5: 6bc3bbbab8226a567320a5ef15b8cd25
SHA-256: 2095c71b66948587b625b68e305efe6b43e0ec885d250aefcac9553d0b973520
Size: 3.63 MB - kernel-debug-2.6.32-642.13.1.el6.x86_64.rpm
MD5: 18a321facdc6eae0bdeb89c79ae23851
SHA-256: 329deabd537d3cc57641c56230f4db9a2ad1f5a0d6f444fa4b2a7334acb09125
Size: 32.73 MB - kernel-debug-devel-2.6.32-642.13.1.el6.x86_64.rpm
MD5: 6b8b2152b39dd8de08107a431ffab6f8
SHA-256: 6e51bf65cdc922c4caddc0926961bc562a5194ac2d83c1881b2a26eff7de60e3
Size: 10.64 MB - kernel-devel-2.6.32-642.13.1.el6.x86_64.rpm
MD5: b6f5800ba4aacda1b7bf04491e9b2ca9
SHA-256: 9432163ffb4d8f3dbf9115897b66da0537b24ae15ecc71007b1f0f41fe22464a
Size: 10.59 MB - kernel-doc-2.6.32-642.13.1.el6.noarch.rpm
MD5: 025c412e47d6115aa29b8228d3ff0991
SHA-256: fffcd0e6d8afd2226cd472c89a5e267ba16fa9f5303356368d04e66316889d20
Size: 12.20 MB - kernel-firmware-2.6.32-642.13.1.el6.noarch.rpm
MD5: ba9fe0e151271aac0be909b9cd33da0b
SHA-256: b96190d3db6ce45a56489cdf19cc152695069e23c1473cc6e95ca7c8cac5baa9
Size: 28.07 MB - kernel-headers-2.6.32-642.13.1.el6.x86_64.rpm
MD5: 75968a9b278b026ff6785c7f8e4b085b
SHA-256: 7b3a81430cf9cff9ead5e2b095f174195d81902620a7a428e380998eb741ddb0
Size: 4.36 MB - perf-2.6.32-642.13.1.el6.x86_64.rpm
MD5: 1885e1903adbe17378d34713726a2883
SHA-256: 5b4d02e7b4509a73362b899c023793f7756374c3f85de026d58f99da7a9dad12
Size: 4.56 MB