kernel-3.10.0-514.6.1.el7
エラータID: AXSA:2017-1276:01
The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.
Security issues fixed with this release:
CVE-2016-6828
The tcp_check_send_head function in include/net/tcp.h in the Linux
kernel before 4.7.5 does not properly maintain certain SACK state
after a failed data copy, which allows local users to cause a denial
of service (tcp_xmit_retransmit_queue use-after-free and system crash)
via a crafted SACK option.
CVE-2016-7117
Use-after-free vulnerability in the __sys_recvmmsg function in
net/socket.c in the Linux kernel before 4.5.2 allows remote attackers
to execute arbitrary code via vectors involving a recvmmsg system call
that is mishandled during error processing.
CVE-2016-9555
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux
kernel before 4.8.8 lacks chunk-length checking for the first chunk,
which allows remote attackers to cause a denial of service
(out-of-bounds slab access) or possibly have unspecified other impact
via crafted SCTP data.
Fixed bugs:
* Previously, the performance of Internet Protocol over InfiniBand (IPoIB) was suboptimal due to a conflict of IPoIB with the Generic Receive Offload (GRO) infrastructure. With this update, the data cached by the IPoIB driver has been moved from a control block into the IPoIB hard header, thus avoiding the GRO problem and the corruption of IPoIB address information. As a result, the performance of IPoIB has been improved.
* Previously, when a virtual machine (VM) with PCI-Passthrough interfaces was recreated, a race condition between the eventfd daemon and the virqfd daemon occurred. Consequently, the operating system rebooted. This update fixes the race condition. As a result, the operating system no longer reboots in the described situation.
* Previously, a packet loss occurred when the team driver in round-robin mode was sending a large number of packets. This update fixes counting of the packets in the round-robin runner of the team driver, and the packet loss no longer occurs in the described situation.
* Previously, the virtual network devices contained in the deleted namespace could be deleted in any order. If the loopback device was not deleted as the last item, other netns devices, such as vxlan devices, could end up with dangling references to the loopback device. Consequently, deleting a network namespace (netns) occasionally ended by a kernel oops. With this update, the underlying source code has been fixed to ensure the correct order when deleting the virtual network devices on netns deletion. As a result, the kernel oops no longer occurs under the described circumstances.
* Previously, a Kabylake system with a Sunrise Point Platform Controller Hub (PCH) with a PCI device ID of 0xA149 showed the following warning messages during the boot:
"Unknown Intel PCH (0xa149) detected." "Warning: Intel Kabylake processor with unknown PCH - this hardware has not undergone testing by Red Hat and might not be certified. Please consult https://hardware.redhat.comfor certified hardware."
* Previously, the operating system occasionally became unresponsive after a long run. This was caused by a race condition between the try_to_wake_up() function and a woken up task in the core scheduler. With this update, the race condition has been fixed, and the operating system no longer locks up in the described scenario.
These updated kernel packages include several security issues and numerous bug fixes, some of which you can see below.
Update packages.
The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
N/A
SRPMS
- kernel-3.10.0-514.6.1.el7.src.rpm
MD5: 3d45108cf895c6cc5702d4f4666b9041
SHA-256: d07d4967ba3d01d2c1f29410b82930ada6f995346c056d2099fbea6bf915cb48
Size: 84.83 MB
Asianux Server 7 for x86_64
- kernel-3.10.0-514.6.1.el7.x86_64.rpm
MD5: a86c4d0f8d6446ec089244c36894b785
SHA-256: 01b78faba420c273d100fc6a37ab4d574ea9f0a26a62ca20bd4ebbd4942e1c92
Size: 37.26 MB - kernel-abi-whitelists-3.10.0-514.6.1.el7.noarch.rpm
MD5: 96aa7210d5394be1d9789199e3980f67
SHA-256: 43a5e611a32ace512f50932fbf1acd19afe4ac6b87d6d99739933c1a2dfb2829
Size: 3.88 MB - kernel-debug-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 8d9a38199969b28eb7d485b9550c3673
SHA-256: 90fea273f19d442b742fe045047bbb2dea3028944a623cc570d09620b7d3f8f4
Size: 39.06 MB - kernel-debug-devel-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 08cdbccca130c290453ab5f9bfb6d197
SHA-256: 34937d9c2ee3f7f01706b4c96763620ba5d2119f941a7927fd27ebcaf275bb05
Size: 12.95 MB - kernel-devel-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 19c96bc16dd84ac4611ecbab31adf310
SHA-256: bce4aa61bb56611e7d5e0a49ae033f391e2459385b07c3bb1138807449ffad97
Size: 12.89 MB - kernel-doc-3.10.0-514.6.1.el7.noarch.rpm
MD5: 33cb75bb2e8044f9c961a14facce9c39
SHA-256: ade7ae00cd3155cb267bc47a7d61e67947794d6ddd7f5e1932bc2708693f3e16
Size: 15.18 MB - kernel-headers-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 2ec996c0f251985b7fa343646cc586ac
SHA-256: d7ede23148660e093eb1e439928a8ef75f6c70b6a5613f614e5c0ef7fb470040
Size: 4.78 MB - kernel-tools-3.10.0-514.6.1.el7.x86_64.rpm
MD5: f832bd855d9599a4345e6be479beaf1c
SHA-256: a0b2e7fe5950389099c686283c8df58efc1a11b1240decfb6e2c06b65f62fc7d
Size: 3.96 MB - kernel-tools-libs-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 42311c77b08b54c8cc9c44d3b094382e
SHA-256: 190eb3506dc9af567c7ce0c866e606d9b3f18ccbe26bdd13e7a6dc1969b2fd99
Size: 3.88 MB - perf-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 6df7c302bdacb639ff3e5670719d342d
SHA-256: c80d70bcfeedf32ab309318bfe0962f5a6ba53e9b2a35b1eb706bef58eb396b7
Size: 5.07 MB - python-perf-3.10.0-514.6.1.el7.x86_64.rpm
MD5: 6188fc6831eab9532a1db1088b2f1fa7
SHA-256: 89b439509962254f93424a855b3f3584ddb098ab3d65d4576fd1cd0724529b59
Size: 3.96 MB