kernel-2.6.32-696.23.1.el6
エラータID: AXSA:2018-2645:03
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
Security Fix(es):
* hw: cpu: speculative execution branch target injection (s390-only)
(CVE-2017-5715, Important)
* hw: cpu: speculative execution bounds-check bypass (s390 and powerpc)
(CVE-2017-5753, Important)
* hw: cpu: speculative execution permission faults handling (powerpc-only)
(CVE-2017-5754)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fixes:
* If a fibre channel (FC) switch was powered down and then powered on again,
the SCSI device driver stopped permanently the SCSI device's request queue.
Consequently, the FC port login failed, leaving the port state as "Bypassed"
instead of "Online", and users had to reboot the operating system. This update
fixes the driver to avoid the permanent stop of the request queue. As a result,
SCSI device now continues working as expected after power cycling the FC switch.
(BZ#1519857)
* Previously, on final close or unlink of a file, the find_get_pages()
function in the memory management sometimes found no pages even if there were
some pages left to save. Consequently, a kernel crash occurred when attempting
to enter the unlink() function. This update fixes the find_get_pages() function
in the memory management code to not return 0 too early. As a result, the kernel
no longer crashes due to this behavior.(BZ#1527811)
* Using IPsec connections under a heavy load could previously lead to a
network performance degradation, especially when using the aesni-intel module.
This update fixes the issue by making the cryptd queue length configurable so
that it can be increased to prevent an overflow and packet drop. As a result,
using IPsec under a heavy load no longer reduces network performance.
(BZ#1527802)
* Previously, a deadlock in the bnx2fc driver caused all adapters to block and
the SCSI error handler to become unresponsive. As a result, data transferring
through the adapter was sometimes blocked. This update fixes bnx2fc, and data
transferring through the adapter is no longer blocked due to this behavior.
(BZ#1523783)
* If an NFSv3 client mounted a subdirectory of an exported file system, a
directory entry to the mount hosting the export was incorrectly held even after
clearing the cache. Consequently, attempts to unmount the subdirectory with the
umount command failed with the EBUSY error. With this update, the underlying
source code has been fixed, and the unmount operation now succeeds as expected
in the described situation. (BZ#1535938)
Users of kernel are advised to upgrade to these updated packages, which fix
these bugs. The system must be rebooted for this update to take effect.
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis.
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and
branch prediction may allow unauthorized disclosure of information to
an attacker with local user access via a side-channel analysis.
CVE-2017-5754
Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis of the data cache.
Update packages.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
N/A
SRPMS
- kernel-2.6.32-696.23.1.el6.src.rpm
MD5: 47fcb7122ddd63ba50cad4f4396b80b8
SHA-256: 452b174b493fafe955c13d1c16b687476092423d3ae2955f3596851608ec2db5
Size: 128.66 MB
Asianux Server 4 for x86
- kernel-2.6.32-696.23.1.el6.i686.rpm
MD5: 24570a3368c1e67376fe016a8e4a7b36
SHA-256: a0aa474205bb8071366b48f6511ac59e678f632a222edef7e4911fd4cb0c74a2
Size: 29.96 MB - kernel-abi-whitelists-2.6.32-696.23.1.el6.noarch.rpm
MD5: dda5d165419e921420ff66e7e7119966
SHA-256: acfe8359092f5ae9453b23b1402bfe5995c7184d676f1e1f7819e9567a585f30
Size: 3.77 MB - kernel-debug-2.6.32-696.23.1.el6.i686.rpm
MD5: 0c22bc0abc8c19d148146f5e321b3850
SHA-256: 6059dc0f4133fecd4b2aeedb91293ac68c76333a1e2e5e8b341229e54b215a8c
Size: 30.76 MB - kernel-debug-devel-2.6.32-696.23.1.el6.i686.rpm
MD5: 3d26f8f9343e957dba2f253ff5218da4
SHA-256: 9fbcc28c95d9f7dcc3130e48325f5668ff2be9a5e8c9b88ecc62e42ace292d5d
Size: 10.74 MB - kernel-devel-2.6.32-696.23.1.el6.i686.rpm
MD5: b7736000357062151085572ef48f1849
SHA-256: da82ac4253bacc5e88ae3833e23f741a6bff38a0b30456a9c179b40b71c7d193
Size: 10.70 MB - kernel-doc-2.6.32-696.23.1.el6.noarch.rpm
MD5: 4160b1fd2cac0399d5fcbb14f3f7f1a0
SHA-256: 8c1112c4d7e4b9255f3a012bde44af7df337430722e0be6ca8a192f898af001b
Size: 12.34 MB - kernel-firmware-2.6.32-696.23.1.el6.noarch.rpm
MD5: b56e4c1251557a0e3d9577a0a48d342d
SHA-256: 0d7a5773050703c7d5d416ee206eaaa63c1221cf69bccac879ac05ea291f6f1d
Size: 28.83 MB - kernel-headers-2.6.32-696.23.1.el6.i686.rpm
MD5: 369e88e0f5ebef472f9cc5da03575de9
SHA-256: 984d7b6c46c6d4e1b8a25bbc990f70013fca7a9eb01e90058beb6aadc4a8c293
Size: 4.49 MB - perf-2.6.32-696.23.1.el6.i686.rpm
MD5: c089a83529815d64623c9d26a6eeb7f3
SHA-256: 2564d6230765605399c0a087cf550e8bfe26dace90346fa90888f46118b9d2e1
Size: 4.72 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-696.23.1.el6.x86_64.rpm
MD5: ad2b0fe58207956370a5497914c5a592
SHA-256: 06052cd1cadd22db8c36a965ec3e2ea3f38a0a8ed50da1960ded61ea3488d09a
Size: 32.28 MB - kernel-abi-whitelists-2.6.32-696.23.1.el6.noarch.rpm
MD5: 4ae43fdbe60d89589c0a59131081e349
SHA-256: f9f81a78ebe99f8147712249a61727573e05f43d2be6cd9037da1c25e50c26f0
Size: 3.77 MB - kernel-debug-2.6.32-696.23.1.el6.x86_64.rpm
MD5: 292334bdc510ae1cfb74b0ee355646ee
SHA-256: c60c11bd5aa9f0c3f59aced8515b5dd192514fc8a7875a9e8d24b0649a2a12b4
Size: 33.15 MB - kernel-debug-devel-2.6.32-696.23.1.el6.x86_64.rpm
MD5: 738dc1a2d6c31682cc45c54659128a95
SHA-256: 47f216556eb7308772d60c5b31b92310f190f7c5174c6f79028e6592a5c12feb
Size: 10.79 MB - kernel-devel-2.6.32-696.23.1.el6.x86_64.rpm
MD5: 2067b78c3fdd203619fa5fe21ca2510b
SHA-256: b2ed6e6a73e335387431c7e2c022b0c9e127498301b8d0d7a80114f16c6def2c
Size: 10.75 MB - kernel-doc-2.6.32-696.23.1.el6.noarch.rpm
MD5: 12df78645855df5a8d2c235c1a079413
SHA-256: cd2c7180e8daeb5e175038608dd2985c51f4e3d05d615715a5d8a809973ffacc
Size: 12.34 MB - kernel-firmware-2.6.32-696.23.1.el6.noarch.rpm
MD5: 70544d9b6020f284c3d72fb5e0e0c718
SHA-256: a1a8b3f4f628b8cffe85219d02a8ab8740281d539ef24ef4b71fcb8d7b75b8ef
Size: 28.83 MB - kernel-headers-2.6.32-696.23.1.el6.x86_64.rpm
MD5: 9532a3d8bc7a31f5d29d273af926321d
SHA-256: 98817d41f51e7156784d401b85d3b938c615d40010f69e56bbb4c5e1f9f95967
Size: 4.49 MB - perf-2.6.32-696.23.1.el6.x86_64.rpm
MD5: 1ce7b47b18c72d11c32a83fc5cbffeee
SHA-256: 26024c4cf3f257d2c5e456ee8e55826bb233b4d12f6ea0951313faf13ebf8c21
Size: 4.69 MB