7.4 C
London
Friday, November 24, 2017
Home Tags Race Condition

Tag: Race Condition

A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is...
A local privilege esclation flaw has been fixed in the Linux kernel, but several upstream distributions have yet to release updates.

Administrators should plan on mitigating the vulnerability on Linux servers and workstations themselves and monitor...
CVE CVSS base score Summary CVE-2016-1762 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) The xmlNextChar function in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document. CVE-2016-444...
CVE CVSS base score Summary CVE-2015-5600 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices withi...
An update for kernel is now available for Red Hat Enterprise Linux 7.1 ExtendedUpdate Support.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operatingsystem.Security Fix(es):* A flaw was found in the way the Linux kernel's networking subsystem handledoffloaded packets with multiple layers of encapsulation in the GRO (GenericReceive Offload) code path.

A remote attacker could use this flaw to triggerunbounded recursion in the kernel that could lead to stack corruption, resultingin a system crash. (CVE-2016-8666, Important)Bug Fix(es):* When a virtual machine (VM) with PCI-Passthrough interfaces was recreated, theoperating system rebooted.

This update fixes the race condition between theeventfd daemon and the virqfd daemon.

As a result, the operating system nolonger reboots in the described situation. (BZ#1391609) Red Hat Enterprise Linux HPC Node EUS (v. 7.1) SRPMS: kernel-3.10.0-229.46.1.el7.src.rpm     MD5: eb82f6173c40ac0931cff636dafcb802SHA-256: c50bbb8e3c5a6fb9c5cc2addf5f73efe34074a9c72592222aa634fa2fb28642d   x86_64: kernel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: eebaaa2903a6edc607f79bb959876ceaSHA-256: 36998ebae77cd1a7ecf7c82b28014470ba1c3d6890d649b240e943c2e9f3524c kernel-abi-whitelists-3.10.0-229.46.1.el7.noarch.rpm     MD5: b021a7f60694e790f53889c26d66ee2fSHA-256: e9ffadcadbfc50e8ca59233b839551c376e7242b7d3d2d225ecad6af989a9d73 kernel-debug-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 064931e3210c43f677a957def3c2635dSHA-256: 9470f05eca80842e04cb9a1ccec84862eddc841cf2307bbd6e16d93e3ac323fd kernel-debug-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 53de79a51c771512c82ed14aa47615d3SHA-256: 158c1caa2eea775d7cf28e579c996b51256e10d1d8f3a2a51673a83f6953a765 kernel-debug-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 4fddb0d7bc6e4e9bc1a7b5e920ef8ea8SHA-256: 727edcd7180e6339ee21604f994b50c6f27ccd6bfc84eb095c2365803bdafd22 kernel-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 84282992fe1a451e08db45a556c6055cSHA-256: 48e931f8354bd380a0cfee7030bf80cc8eed9735b5f839217ae5625ab162fefe kernel-debuginfo-common-x86_64-3.10.0-229.46.1.el7.x86_64.rpm     MD5: ded3a586b5b9e7d056124f06c386bd9cSHA-256: 48cba79219ead6676acdcc0c39aebd409071f1e95632ba5609c306ff0f945394 kernel-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 2b834a06236b5636d6dc6d36315d24baSHA-256: e0e97b797ac4353a237890a66dc16c8204fdfdb16f8bc7ce06cb9fa44cfb2169 kernel-doc-3.10.0-229.46.1.el7.noarch.rpm     MD5: 28fbfc640bcc6ad37f4eb28cc9994932SHA-256: e74cac20d96212a918e508123fe2f8017014cf51a8d7c2b2fb5e377cfa38779f kernel-headers-3.10.0-229.46.1.el7.x86_64.rpm     MD5: ea5eef5f3f3314d43171b7617e4e4d91SHA-256: 818e170959b3fad5572201696215455136b2bc16d10e9e664a366b6f1da232ec kernel-tools-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 28b80fc4ba9454988c67dd3862f4fb26SHA-256: 450a7cb073958de92e15a16da9938c67d23cb07bf87e1504853b34a094653cc0 kernel-tools-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 7489f88e631b3f3975def4f139c3b126SHA-256: 275829d4abdcbfc2ac0bfe94b8f8fea1034df48db998f1f0937e2cc2360103d3 kernel-tools-libs-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 376aa16aca1b6751e5cccef0d522dc52SHA-256: 64d3e575775e8cdcd83d64432b3f2c0b7777d2cac9b69f4d61fa86cbcf4ca0cc kernel-tools-libs-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 5fc1f87a1d07a162a481fd20a1b089e8SHA-256: b77f3ed2d4e904a640cb9295b21235301af6ce02fec997f1b5442e04a250b6f8 perf-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 518860373a95034a54f6a961004e6bebSHA-256: db9e113efa1def58d3dbe94acaa0d4abb5ec37d9dc93a8b8ac65beaed6e43f77 perf-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 69d0bf7cfdf0af85538347d8825609e7SHA-256: a03c27e43505478a23d67d05f07b7154d7321c198fb99e2ec2b869287ffb7bda python-perf-3.10.0-229.46.1.el7.x86_64.rpm     MD5: e6cf38e46b76af2386c2494043026168SHA-256: db082c13a128545dcc5bdccf5f59d98229b3e4c508905524f51e7a56eb417204 python-perf-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: e0950880e3da2c88fcff83c82770dc65SHA-256: 4d9d982edd9c6baaf77921f1544e491a925d683695f18b6e49f7f460ba4b06ac   Red Hat Enterprise Linux Server EUS (v. 7.1) SRPMS: kernel-3.10.0-229.46.1.ael7b.src.rpm     MD5: fabb20a1cd6ff6ebed2820aa69a0b30dSHA-256: 83d614bff184e37623505dd71aa72a67f62ffe7679a68ec2d801d011541c31c5 kernel-3.10.0-229.46.1.el7.src.rpm     MD5: eb82f6173c40ac0931cff636dafcb802SHA-256: c50bbb8e3c5a6fb9c5cc2addf5f73efe34074a9c72592222aa634fa2fb28642d   PPC: kernel-3.10.0-229.46.1.el7.ppc64.rpm     MD5: da18e1976819de9dd6d12c4cb207a59cSHA-256: e20fa1061253dcb48c167e75df1c3408d2f7aa8fe04922506d93a61c9d49e23b kernel-abi-whitelists-3.10.0-229.46.1.el7.noarch.rpm     MD5: b021a7f60694e790f53889c26d66ee2fSHA-256: e9ffadcadbfc50e8ca59233b839551c376e7242b7d3d2d225ecad6af989a9d73 kernel-bootwrapper-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 34d97378ef658a463af828cc6382a2f4SHA-256: 3d1fd78e9d437c5da1de3f9402608650c3ee0968e0dccd61b8e293c190a042c2 kernel-debug-3.10.0-229.46.1.el7.ppc64.rpm     MD5: ccde9fc8cb62f1216201a56113d655adSHA-256: 947df012692b0a8a9b61b77642cd870152332f54705cbbbcbb37d503c037dbba kernel-debug-debuginfo-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 5d07f6b87f071ec73858b9b5a06b8870SHA-256: 37865f75b31d21536b3601e48f3c31d13091f596787a13c5459e6b6606c769c9 kernel-debug-devel-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 9540ecdff1a3faf016bc7d0f79af69aaSHA-256: 7d1be84f7a4510682b60fa0793620ecb9f9ad1a56b2ff11498f242f470a0f91b kernel-debuginfo-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 81fbf4feb97818aa41ed0c0ad51f3e16SHA-256: c9b3ef4424cc53c99c74bcd0f5d31c3db1a3a789831bc0a98761e850349a088d kernel-debuginfo-common-ppc64-3.10.0-229.46.1.el7.ppc64.rpm     MD5: be27dfd34d19791179c35dacd1fc2fedSHA-256: a772e8d3e4504cbce06d7fb2b4267ceb389d97f56288835527c58c5242994582 kernel-devel-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 0ac7e30b62a1fbc700c45aab1c243d42SHA-256: 583cdd0a7fed0920f3424912efd9f1824daa561a2b29ef7f6a730bccc95585ad kernel-doc-3.10.0-229.46.1.el7.noarch.rpm     MD5: 28fbfc640bcc6ad37f4eb28cc9994932SHA-256: e74cac20d96212a918e508123fe2f8017014cf51a8d7c2b2fb5e377cfa38779f kernel-headers-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 04f0f2e38f8c8effe5afa1ced6d1b11eSHA-256: d3a494482629ff565fdec0f941f9ac097b35c34f10219c299a37edc46c77c26f kernel-tools-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 831110555db66e45d6e130f20b8dd12fSHA-256: 9922f623942f6573a4b4ce21943e36cd69fc03050632b914affe696e0d09dcbc kernel-tools-debuginfo-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 3420915e02dde303d6a43ef49d74e458SHA-256: a04e99b051004a4350dddf86d79091286eaec2f36a8e17aad905e51e37c1ee32 kernel-tools-libs-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 818817395d7425da7b1f5240b05e9ca2SHA-256: 88ea9f46b06a1638a27f6f218357dbbd3548c9a74e5f5e30bdf3812990d0e8ca kernel-tools-libs-devel-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 36b9e015ad58d13b94ef383c7b724f41SHA-256: 9f245789e4647e57185372ac626b4439f486375463289e222a9d458e3fd0f6d8 perf-3.10.0-229.46.1.el7.ppc64.rpm     MD5: de6416978439f98928ebc40e6412321eSHA-256: 9ad35d56bf54a934324ae214f62f5e21a358f5d43612bc2e56cdd781859b00fe perf-debuginfo-3.10.0-229.46.1.el7.ppc64.rpm     MD5: a4d144f0be0f7f778f6e70113e37b86aSHA-256: 350c6f1ffa00f12905a2c41c6b363bec5a8b1ec69d47e2e5a582eda9e97eca20 python-perf-3.10.0-229.46.1.el7.ppc64.rpm     MD5: f58d7b1992fcf760dbe2934b82758f93SHA-256: e44a4e4ff4b7e35d3c2b34de87bf6669cc97f75ee2d1133c672645aac8145f6b python-perf-debuginfo-3.10.0-229.46.1.el7.ppc64.rpm     MD5: 9ac167078dc2f6c1ad18cc37ec50e41dSHA-256: 9937a98afe7a2eb0b10e2218781a3b9e6429147815338f947a5d69628673bdcc   PPC64LE: kernel-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: cde478f0f36304e7ccf63f685dff8fbfSHA-256: 59fee8700b4abf362f5ca667c7a5ab71d5b26f3fb6550f9b17822a8dd4a9db4e kernel-abi-whitelists-3.10.0-229.46.1.ael7b.noarch.rpm     MD5: 1533592451a944a91aea562896fca34bSHA-256: 2c859d7e2c11147dfa8f480812ba5aa25c0811ec2fb882b8ba58c72cca504afe kernel-bootwrapper-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: e51f39de097aa16a5056e477f040a230SHA-256: 15751dbb76d403bd726f1bf00a4257663b27594bb4e35b70ed8a2de289a39c71 kernel-debug-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: f23782a77d64fa20fe88a0db333b123eSHA-256: 417215866a0cf1df6fd094c6db87a3af39d76c1da13b52ad515941f5905238a0 kernel-debug-debuginfo-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 0b66d029cce08401861206efcb1e803eSHA-256: bb4f09f57239bd3b9e42e2c246b051fa6327140ec36aa461c459a25ca8bbd7fb kernel-debug-devel-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 9b93b697e666b4dd4eeef04c224e9dceSHA-256: 83fd903533528fae425e9b43ce48ca3face63d3e62468bd788c9110fb0766844 kernel-debuginfo-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 24522bd6d8554bd1b37b221fe5397259SHA-256: 5b3aaf914f6dd7a4e59ead97c5e523c86da6e82d890f8e7160e6ce8a447c5d1a kernel-debuginfo-common-ppc64le-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 9b5f7c3ccb670a21e93031feb511da89SHA-256: 0d0f0d68804f24cbd8ffc5c184c172869e8ffe9b2d06b8da996e4698b7d9ec0e kernel-devel-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: e32ee85d952fa5285c1d071786ee35adSHA-256: e36bb7f0284437c6c1ac222f0e3a1ac38ea255649ba6929f9948a33ef438f5c2 kernel-doc-3.10.0-229.46.1.ael7b.noarch.rpm     MD5: f3bd5433161dc37d5fa614679b982e0aSHA-256: 1c350f9a09481427ab1c18341e940420c6639b4a9c8ff888e21fcb04d43a8562 kernel-headers-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 0d844aac4143afc2f43ed1d9df580249SHA-256: 21d0b037289d66c1f9b8bed59d0250029ed17c88bb0ce434b01d57b244725fc7 kernel-tools-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: db92c86c36d2ed3a5c15dfa934d8c1a4SHA-256: 9f2adc0b7e530f38de745d92e7857db14337dc5847a968a346277653f9548685 kernel-tools-debuginfo-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 2dedbe49f733ceb38a12014660760489SHA-256: 5d0cf26aaf93c3da39c24ff424bfddcfc04a9ef57e20f49d3aa88232f03fda32 kernel-tools-libs-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: ec74fd5749b26414d40b46900c72ef39SHA-256: ce264c44bb877c833daf5de6c6106c58ed5f2514e4ff9f1a18aee410a6ba9075 kernel-tools-libs-devel-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: bae8db250ae6b3487d364fcd0912abd8SHA-256: 46df013ad2d5d263515e5d7d177416f01a47cccaba8f1dea03e3454e7ab28d94 perf-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 152fc4053661576c44108b09da7c4f2aSHA-256: dd54cb918c413f358548fa903e6d5215508a83c0ea1dcf52b45df641d6bb61db perf-debuginfo-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: c73687fa8e266c11f009402a70400d77SHA-256: 27ef6d40b8fb6f298394103077e26b2f94be02d5d681bc14e48babb99644b5f6 python-perf-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 69c3fe1afcef50878da92f7f6aad9933SHA-256: 127b4a32b708425379e324708e23f5aa9633c16b75809db4e957bf08b1c77653 python-perf-debuginfo-3.10.0-229.46.1.ael7b.ppc64le.rpm     MD5: 2f8e1002c8f8338564dab80011a7886eSHA-256: 81dd5eeb4729e2e24b1ff8bfecd3a496db5d684c8302397c6b1187371d2561e4   s390x: kernel-3.10.0-229.46.1.el7.s390x.rpm     MD5: ce50a002f557452bb6dd98a629ee642aSHA-256: bd3b706c04864bbfaa91e40c8fa30973f899eecd80f4d16b562bba1c5bc0ea75 kernel-abi-whitelists-3.10.0-229.46.1.el7.noarch.rpm     MD5: b021a7f60694e790f53889c26d66ee2fSHA-256: e9ffadcadbfc50e8ca59233b839551c376e7242b7d3d2d225ecad6af989a9d73 kernel-debug-3.10.0-229.46.1.el7.s390x.rpm     MD5: 3ec6df2d965f4cdfb016fba12a37fa12SHA-256: ec3653b53fd7f530a7ff8ac1b467e728c219751736c4dbdc2a9ea5587dc36de3 kernel-debug-debuginfo-3.10.0-229.46.1.el7.s390x.rpm     MD5: 41cc6d17e7a7a9467c600174f8bd05e9SHA-256: b7555b59606ead40847d0bede85bec425739106568c26089c5d83f06fc0ef50c kernel-debug-devel-3.10.0-229.46.1.el7.s390x.rpm     MD5: 6914c4e04222dd864bc99ca20fdb9db4SHA-256: 1d0d46cac3bb0f4370964927e8aa1235bee26076a20a0670416efb80525afaaa kernel-debuginfo-3.10.0-229.46.1.el7.s390x.rpm     MD5: 1678a4c4f9f5519f441795af55661aeaSHA-256: 9461aaeb5795cd9858c0a1a4ec28aa657ad06bef85a713de3196727c2964d871 kernel-debuginfo-common-s390x-3.10.0-229.46.1.el7.s390x.rpm     MD5: ff68b1a312e0ea561b90b4c532932ee9SHA-256: 72484652e588881303b667cf3abf612fd6392a06055eb59ed80e830df6a66b16 kernel-devel-3.10.0-229.46.1.el7.s390x.rpm     MD5: ae1515ccff45c9fb664677467129b564SHA-256: a6b2edeaeb88da5cdbcc4ec64dfad39a567b9d723e726a4f50855342368d0862 kernel-doc-3.10.0-229.46.1.el7.noarch.rpm     MD5: 28fbfc640bcc6ad37f4eb28cc9994932SHA-256: e74cac20d96212a918e508123fe2f8017014cf51a8d7c2b2fb5e377cfa38779f kernel-headers-3.10.0-229.46.1.el7.s390x.rpm     MD5: 087b2f05dd436bbf5c4701236d0cbaebSHA-256: ff1abbef6660467a48365b2e622c4f4896879acbdb353b38fe93a06c793ae605 kernel-kdump-3.10.0-229.46.1.el7.s390x.rpm     MD5: a0af5f9ea66119d86335db7dc97f2f05SHA-256: e66c01d05dd7e92e77a6e8b665ead85c694117d220145a9e4510b0c36869c879 kernel-kdump-debuginfo-3.10.0-229.46.1.el7.s390x.rpm     MD5: eed36dab73520c9d62883d02ce82a0cdSHA-256: 56b6db05cd64a4a5ef6f9c13045bd600f69299c5c64f3ef721eacb75e5fa01b3 kernel-kdump-devel-3.10.0-229.46.1.el7.s390x.rpm     MD5: e44ad20da9a038c56a67b1cc9193c340SHA-256: c66dd94fa1adc5e083054b10c6ef15edc2f65474c29f5e4a9f2bb768d3ed201e perf-3.10.0-229.46.1.el7.s390x.rpm     MD5: 1a1d7503eab84c311e53702b11c1d626SHA-256: 950e1500e42b8845f9e1e27d2285a31c7ed815beac7b6feddcd72dc16472eaf6 perf-debuginfo-3.10.0-229.46.1.el7.s390x.rpm     MD5: 933fbed1fdfff99601e979e8c6ff4a99SHA-256: cd1577ba5316450273883345f15849a438ee18713f4b310be199c0bc59ff440b python-perf-3.10.0-229.46.1.el7.s390x.rpm     MD5: d169ec523ad86378dd0a1de9ee6415f1SHA-256: e5e8a3eecebb6297f84282b3b92bfcc90d3f3d6694a9a6ae9e3b994371ef1028 python-perf-debuginfo-3.10.0-229.46.1.el7.s390x.rpm     MD5: b95d947b472519f84ef5a014d1180584SHA-256: d7f0bde57a455bb524002f203c45851cc3d05e826b9cdb54dfea41f61d554968   x86_64: kernel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: eebaaa2903a6edc607f79bb959876ceaSHA-256: 36998ebae77cd1a7ecf7c82b28014470ba1c3d6890d649b240e943c2e9f3524c kernel-abi-whitelists-3.10.0-229.46.1.el7.noarch.rpm     MD5: b021a7f60694e790f53889c26d66ee2fSHA-256: e9ffadcadbfc50e8ca59233b839551c376e7242b7d3d2d225ecad6af989a9d73 kernel-debug-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 064931e3210c43f677a957def3c2635dSHA-256: 9470f05eca80842e04cb9a1ccec84862eddc841cf2307bbd6e16d93e3ac323fd kernel-debug-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 53de79a51c771512c82ed14aa47615d3SHA-256: 158c1caa2eea775d7cf28e579c996b51256e10d1d8f3a2a51673a83f6953a765 kernel-debug-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 4fddb0d7bc6e4e9bc1a7b5e920ef8ea8SHA-256: 727edcd7180e6339ee21604f994b50c6f27ccd6bfc84eb095c2365803bdafd22 kernel-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 84282992fe1a451e08db45a556c6055cSHA-256: 48e931f8354bd380a0cfee7030bf80cc8eed9735b5f839217ae5625ab162fefe kernel-debuginfo-common-x86_64-3.10.0-229.46.1.el7.x86_64.rpm     MD5: ded3a586b5b9e7d056124f06c386bd9cSHA-256: 48cba79219ead6676acdcc0c39aebd409071f1e95632ba5609c306ff0f945394 kernel-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 2b834a06236b5636d6dc6d36315d24baSHA-256: e0e97b797ac4353a237890a66dc16c8204fdfdb16f8bc7ce06cb9fa44cfb2169 kernel-doc-3.10.0-229.46.1.el7.noarch.rpm     MD5: 28fbfc640bcc6ad37f4eb28cc9994932SHA-256: e74cac20d96212a918e508123fe2f8017014cf51a8d7c2b2fb5e377cfa38779f kernel-headers-3.10.0-229.46.1.el7.x86_64.rpm     MD5: ea5eef5f3f3314d43171b7617e4e4d91SHA-256: 818e170959b3fad5572201696215455136b2bc16d10e9e664a366b6f1da232ec kernel-tools-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 28b80fc4ba9454988c67dd3862f4fb26SHA-256: 450a7cb073958de92e15a16da9938c67d23cb07bf87e1504853b34a094653cc0 kernel-tools-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 7489f88e631b3f3975def4f139c3b126SHA-256: 275829d4abdcbfc2ac0bfe94b8f8fea1034df48db998f1f0937e2cc2360103d3 kernel-tools-libs-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 376aa16aca1b6751e5cccef0d522dc52SHA-256: 64d3e575775e8cdcd83d64432b3f2c0b7777d2cac9b69f4d61fa86cbcf4ca0cc kernel-tools-libs-devel-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 5fc1f87a1d07a162a481fd20a1b089e8SHA-256: b77f3ed2d4e904a640cb9295b21235301af6ce02fec997f1b5442e04a250b6f8 perf-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 518860373a95034a54f6a961004e6bebSHA-256: db9e113efa1def58d3dbe94acaa0d4abb5ec37d9dc93a8b8ac65beaed6e43f77 perf-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: 69d0bf7cfdf0af85538347d8825609e7SHA-256: a03c27e43505478a23d67d05f07b7154d7321c198fb99e2ec2b869287ffb7bda python-perf-3.10.0-229.46.1.el7.x86_64.rpm     MD5: e6cf38e46b76af2386c2494043026168SHA-256: db082c13a128545dcc5bdccf5f59d98229b3e4c508905524f51e7a56eb417204 python-perf-debuginfo-3.10.0-229.46.1.el7.x86_64.rpm     MD5: e0950880e3da2c88fcff83c82770dc65SHA-256: 4d9d982edd9c6baaf77921f1544e491a925d683695f18b6e49f7f460ba4b06ac   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Updated kernel packages that fix several bugs and add various enhancements arenow available for Red Hat Enterprise Linux 7. The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following bugs:* Previously, a "NULL pointer dereference" problem in the pick_next_task_fair()function occurred.

This update fixes the bug by applying a set of patches on theCompletely Fair Scheduler (CFS) group scheduling.

As a result, the "NULL pointerdereference" problem no longer occurs. (BZ#1373820)* When repetitively shutting down and powering on the Chrony Network TimeProtocol (NTP) client, the following error occurred on the Hyper-V servers:"Adjusting Time Stamp Counter (TSC) more than 11%." This update limits themaximum adjustment cap in the internal steering to 11%, and the error no longeroccurs under the described circumstances. (BZ#1375599)* Previously, tasks writing to a NFS file in some cases became unresponsive,because they waited for the PG_BUSY flag to be cleared.

This update fixes theproblem by ignoring the zero-length requests at the page I/O layer.

As a result,writing to affected NFS files now proceeds as expected. (BZ#1378916)* Prior to this update, if a Red Hat Enterprise Linux 6 guest running on aHyper-V hypervisor took a long time to boot, the hypervkvpd daemon in some casesfailed to start.

As a consequence, the guest could not use the services providedby these daemons, including online backup, file copy, and network settings.

Thisupdate fixes the problem by refactoring the hv_util service corresponding tohypervkvpd.

As a result, hypervkvpd starts properly in the described scenario,which makes the affected services available as expected regardless of thevirtual machine's boot time. (BZ#1380305)* In some cases, mounting a new file system to a slave mount tree caused theoperating system to terminate unexpectedly.

This update modifies handling of themnt_group_id parameter in the propagate_one() function, and the operating systemno longer crashes in the described situation. (BZ#1381319)* Previously, an XFS metadata buffer reference counting race error sometimescaused soft lockups in the filesystem freeze path.

For example, this problemoccurred when creating device mapper snapshots.

This update fixes the bufferreference counting, and all buffers are now reclaimed correctly during afilesystem freeze.

As a result, the kernel soft lockup no longer occurs underthe described circumstances. (BZ#1381563)* Previously, changing the speed of a network device with the "ethtool -s"command in the mlx5 driver did not work correctly. Running the command switchedthe speed to unknown and caused mlx5 to become unresponsive.

This updateenforces the transition of the speed regardless of the port's current operationstate.

As a result, speed change of a network device in mlx5 now works asexpected. (BZ#1385479)* When rebinding a PF_PACKET socket with the same protocol and device as in theprevious bind, the use count of the interface was not decreased.

As aconsequence, the deletion of the interface failed with the following errormessage: "unregister_netdevice: waiting for dummy0 to become free. Usage count =1".

This update removes the race condition in the packet_bind() function.

As aresult, the deletion of the interface now proceeds as expected, and the errormessage no longer occurs. (BZ#1388615)All users are advised to upgrade to these updated packages, which fix these bugsand add these enhancements.

The system must be rebooted for this update to takeeffect. Red Hat Enterprise Linux HPC Node EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server AUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server EUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   PPC: kernel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4df8233d7db890ca98ef3a6f793d11b4SHA-256: d137e012c26ba092a1d32e4b982a8e14d8ab9a56ad0315cf06442b60832c37ff kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64.rpm     MD5: b3ec6a440c65d103dd6e7c53a911eadaSHA-256: 71072d348e8309e20ceace23a1cbf1b74387066d318bce88e9b010b8ff1f03a2 kernel-debug-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 3f1237b3339d458509267a2187083d71SHA-256: 1dfa062090650d92cca32ce8db838830b5f695b6bc5f8ab51dc3a91839a89bb6 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0a70038f32441f83cfafd9d00e40b07bSHA-256: ab408d48c76cfee3329a099f1e963ca002921542d3c97ca686a226cbb91fedd0 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 6ecc0bb5971cb6e120a0408f51a983efSHA-256: 1c9868f14e92ccba285da1ea2a48480abfe9dacea17e1860cabb073227c2046e kernel-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 4e8e5eb74975b79f1fc98c8d0322a2fcSHA-256: da744709f3483adc6dac3fd01d5ec9b2ec8069f9990859ff637f84ef62bb46c2 kernel-debuginfo-common-ppc64-3.10.0-327.44.2.el7.ppc64.rpm     MD5: cd1f2c27c025a8ef531ace742705e15aSHA-256: b2265eebaed3e4d82d0ece6a52d3bb4cb53a7798fa68a4badb43469235fe6959 kernel-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 2367b8f09b7ae853631355c3dcd0f750SHA-256: f42b87fc55c45288c343f430266a0befb4b102683eb2e6efd2f80cbf2aa363e3 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 495bafaa9d1469dfca47b12b7c825678SHA-256: 86a7a911a0153c842ee57477793c867fc2a012eb27244dd0c9b17c2a7c942f2a kernel-tools-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 0f76456d19a7c416a802ee663926b4f6SHA-256: 66c5cfcd166f095aee6f43dd5848a680418e173be76e4d5f312cece5edf76602 kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 8fee8e420763dd6e42842393eccbc052SHA-256: 2de8f54ed6a75d04f9ecd4dd437a088b2e4bd00ebd71da2a818ae393f496cc5f kernel-tools-libs-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 146e4cfaec200d19f936eae4f65c4690SHA-256: d5dbda879cae52c550f6d75e7ba72f0709686d82d2616d20a07ed18f64fbc6a0 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 025c4c9864e94af61a184873848b8047SHA-256: 5531f4740235def51dae267d5b0b33095915f801928c45979c0bce14712b43b3 perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: f4d9aa726d2c07f1df968f39a634acaaSHA-256: 1d1e0164bf964507e2655fbb9725d508cf02136e8fd15af23fa005c8dff3617c perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 88074317c5674a28773b9fbe8e5e9734SHA-256: ccc18eaaade349219a4541bee2e1b829d56b4b335c59ac94344631a1ed40e318 python-perf-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 54382f0de5ea46608065fa1028ed19a6SHA-256: 4fc206606cefc8f2ffea2a5b606d384222f874b8bf56f6709fbd5c03703d5372 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64.rpm     MD5: 40d37ff77387d7d3410df92a0f946ce9SHA-256: dde73ced4f51c0fad3ab0caa5df8036c27b589c06ec412698e1f2696f4d324e6   PPC64LE: kernel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 05fe4cfb8048a77e9f0da6e18f246f63SHA-256: cf55da30873fb765ad1220cdb779ad621fcbed2d33dc0c966d387a83edb4b37c kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-bootwrapper-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: a416b983d18af9a5909c6466d7fdf5c5SHA-256: 3b3c1f0f4107cbbde671dc4b24e79f21e85ff1c1f34bd9bc785b40805dd212e2 kernel-debug-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2e3a1cf0bf1621abc98f0dffb05c0487SHA-256: 03bba1c1ea18689027e99d75306a08dd4f9e14ca9712bab01ae29b4eba551099 kernel-debug-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 21fdcb33e6b1b5bad7d046c7b7c26e83SHA-256: 6105f355d853263ba54a13a1fae55771a50278f3583098d5ecdffc4ef686db41 kernel-debug-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 90315d59617179451c5ba6cbd9c0528cSHA-256: dc090261a2187ad813aef1fb7c2e5d473ee0c064331e1f73af21f363e459ccc1 kernel-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 59f7efeed14601d22ad6e9d96cdbc5afSHA-256: 3e3eb1b6963efc4b5b997dfc7e535544f730cc4301c58263f8abc66ac67402be kernel-debuginfo-common-ppc64le-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: b42629e4d5b925922de3e9341e2ec2bdSHA-256: 8473c757d3050f7666768d0d81917b2ce4dbbce476bd733738f664ea9c388246 kernel-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 14586917d5b11fd64dd07555d561f7baSHA-256: 88a8cc851324c8f9dfc1e1c47a8bede7416e90b6acd8724fe7bbb0e1b3b3a930 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: df6b0b5d3906dc001796c9ae0997cd4fSHA-256: 4c3655df7e17d9fb4e0d7a9390db6a11183312f7b7e6db1a0ff310fcf329f8db kernel-tools-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: acc0597127ee2cd308ed99ccf1e890fcSHA-256: 680fa85318aa416bda211772ec45a21a95e2a463bf22aa11a79a495595be3b2c kernel-tools-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 347cb4f882a2b71a79e05cbf7516c6ceSHA-256: 9fa859a8f741554233ca1daa01f70c2217c8f3d926913a3a80b209056370714b kernel-tools-libs-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c7ad5dfc40a2e4cbc638b712de7dc0b5SHA-256: 7a1ea167f9c1257f301d7d24413672f0707630e9d3f3757b02e7a72002006eb8 kernel-tools-libs-devel-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 2ab03b1887e2fb4a5ed8915850755f2cSHA-256: 621934ffd4759bd928d77115f15ac3802850a7c494f4497a3f89f49229331ef6 perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 9619e6b32539ad03e15f33b1bf3372ddSHA-256: 1d14124102fb6cf43eec950b179cbce9a0031749c59f116a99246afceca5f11e perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: c782ecffb5c65292613eac2c69d46e0fSHA-256: a7148caca8de2989083e031d68f926fe2a50ac20475505f3113b0f1f8042584c python-perf-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 3fd385ba567b308184492d6d446a6207SHA-256: 3d63d1f17d7095122f9854c6584b79d0063e6adaf0983c05ad3d4448a76ab675 python-perf-debuginfo-3.10.0-327.44.2.el7.ppc64le.rpm     MD5: 8934bee4ab9358bc688698baa74c27b2SHA-256: e41fae24fb23e59ff284c8489fddecf08916c58b240b616c487412edc782685b   s390x: kernel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 0067494c986edc0cf12d975ef947d20cSHA-256: f63c8a7e8dcc339f269d92e30ea5f553648ea65eccae7fa9910786257f3c6fbc kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.s390x.rpm     MD5: 06befb7126f33f90d296a68f5421066dSHA-256: 1cd968c89ae087a6fe682202a9b88d97135d271cf7645754c01215e3a69068ec kernel-debug-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 5c6e2c58b1d00d035bda471c342b2da3SHA-256: ef2d092261095ede2547fded65c1ece9e7e3fc2653f657adbf29470601da1b84 kernel-debug-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: d30f0091829743c87c27b90a4e91bca3SHA-256: 89282c5822e8556c9604d1470e7b05873e412ce5dfeda91cf090de94af0b60b1 kernel-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 390afd8e51ddbff727cc7255de283fdfSHA-256: 9f0f3416c7e48038b746ea5701dd9a255cf8c996bd5e58447f26d5cd69b7a320 kernel-debuginfo-common-s390x-3.10.0-327.44.2.el7.s390x.rpm     MD5: b7f2eaff996ff8703f213d0ace10f917SHA-256: 8aafb3609a9447f108ff278570742b1718a4eddd53818dbcf5c6d946c70566de kernel-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: 41304b6b8195f344aca3620e27953c6eSHA-256: ba587789d46d3e19735cff91055e3f7c658028987d1e7dc63079373ca6540f3e kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.s390x.rpm     MD5: 8fee99fba3ec7f0da660096b0aa3abbeSHA-256: 2a7b5b336c7ea5d4041b8546e1eeb72861549a59ebe2019127a612e7c8ac9898 kernel-kdump-3.10.0-327.44.2.el7.s390x.rpm     MD5: 4683c9de892bef90bc4b5062c91fa0cfSHA-256: bd53c7240a9b35c7b50e33676a596b3caeb41855287cfcaac8e2e809623c88e7 kernel-kdump-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: 2a8b878d21d90b0ce0b9bced32756a19SHA-256: 2faf7c261c6323c8b3d70ff77a0c9fbb71fb584fea8b53a32a22ef9056ebbc41 kernel-kdump-devel-3.10.0-327.44.2.el7.s390x.rpm     MD5: fd4cdb952b95b689158be55dc5d2786aSHA-256: 4d7b00a9ad306bd080e27b13a929299016cbd303df5c85c1a8441ba3a225b435 perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: 75c2cec355e72f0a44c896df0c9f1b96SHA-256: c2e9eb817ac28eb14e70f7579045ca445c294fe3b1618887c0b9fd53bb7c5464 perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: dd637c6f2647a466c21f3d9c6d80d834SHA-256: e01937eeb1c3a29424c1c85e8139969e8e12fda53bde53bb372970de5d48cfcc python-perf-3.10.0-327.44.2.el7.s390x.rpm     MD5: df07171e68dd1274e36ef00cc497baffSHA-256: 25b2f4d4c33a9385162f5df2a1bb9559a02b284f22130b74d937570718817bad python-perf-debuginfo-3.10.0-327.44.2.el7.s390x.rpm     MD5: eeee69ebf797c00581ac97884132d414SHA-256: 0e0d8e69220797eb4eb42cd213356fa18ee9089f6d9d608c9eceae3cef200179   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   Red Hat Enterprise Linux Server TUS (v. 7.2) SRPMS: kernel-3.10.0-327.44.2.el7.src.rpm     MD5: ed067a71242f5afe99a419caa65e486cSHA-256: 85738a29cdfd123829c417dd2308ebdd93fae6610f30fb9f5131e645eee91cce   x86_64: kernel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: c211d35430c4319f40179a4bdc260e44SHA-256: e68d4910f64272603dc499cc563cb80f7fb9f8ffb999b8e7e76280afc115346b kernel-abi-whitelists-3.10.0-327.44.2.el7.noarch.rpm     MD5: 366ea6d7a5f6386e506a2bd02238a5d5SHA-256: d61a8516cdd86f10a05a64d5598643ac07f5471cf68ea72c69116fc2c415c9d7 kernel-debug-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 9eab1f2714b71e568ae11ae3856c0aafSHA-256: 45509c5178e2568c947dca247779439d1446ba82a5ed3dcbb7b711a713ebfc6d kernel-debug-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: cc1cc288684e15c30b4be380e84e1674SHA-256: a162d88acc71fdf69fa15e104a95acb521b47a3940673ea099e0b746a5d0c3fa kernel-debug-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: ac46c008671eb3b680886dfbb61b4365SHA-256: 499c278168f86ce7388f60c134e540cacba3eceef3f4e799a5682021e3e30052 kernel-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 61183bc2967fd31809543e3b831bfb02SHA-256: bd9f45adacfaaa26c2ee135af949ce386a1008b419fbf7c4b88fcc9e4e9aed19 kernel-debuginfo-common-x86_64-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 44aecd6cb5eb4a465cc4c522933dbffaSHA-256: cde5677407d82e0edf08695e323b90383c48730188dc7bbb0c7c415d3fe8101a kernel-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 6a015658e34b9b7a793d9a7048c861a5SHA-256: f92f1d92d7e34971fa2590989b6cd5fba54a8d7199593d2d65147f92310f8bc0 kernel-doc-3.10.0-327.44.2.el7.noarch.rpm     MD5: c62f9c9acd7a3bbabfc44851955c8b4cSHA-256: 0a46a6a4b2ce3a8757717975ae406ea4210541c56ddb8ad36ebd99107c47098b kernel-headers-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e7f958ade1fefe50a2ad7dfd81e71dc9SHA-256: 06487b1ebf5abe4c9c18a304b4676371f684a327ed833e9ef5e6e8b4b0385d6b kernel-tools-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 1c67f751e129abfc60004384d2918250SHA-256: 1d657fd17dae9543acc62167cb730d95e6b4a8298d53502720c39a1d6029765a kernel-tools-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f4777b77a2a4b21c687f624335fc5880SHA-256: 634e1c8913155915b3c16adaf934bf0549572e45dca853097d7d2f5f6ec5b353 kernel-tools-libs-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 86741a09ef74294b6d2e4202e148b219SHA-256: a03185d68d51b9cde7f27559b3948767afdc604ce2fc9ca6d1fc80c5b8e25e7a kernel-tools-libs-devel-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 283ec15b4d7bf676a15092144dfcdfc1SHA-256: cf50eadcee947eeaae8897249ea2aa8161fbf58373029c13debf5d01989fd6bd perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: 37725017fa50fa42999c1c9c7851589cSHA-256: ae169687c8fefbb34dbd35cdaeac5cb3422911fb17e4e5db6f63af715d98bb8e perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: fdcb542150373abc30266edc0239ce64SHA-256: 5b0e63affe1fc68be1952cb6704ba0658850b9c39321c7940991f8591fccc6b4 python-perf-3.10.0-327.44.2.el7.x86_64.rpm     MD5: f9bad7d9b9fcd723868f2dead832011cSHA-256: fe077a28f3aa73dd77f3fbfbc030deca70b1658f9c07fcc9d3cf0af56aa9f5df python-perf-debuginfo-3.10.0-327.44.2.el7.x86_64.rpm     MD5: e8791af304f50531567e76d283490141SHA-256: 8b7f096492cf8bf43812294706783922009f70c0979c7c2310bf5703bc550169   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco ASR 5000 Series Software could allow an unauthenticated, remote attacker to cause a reload of the ipsecmgr process. The vulnerability is due to a race...
Updated qemu-kvm-rhev packages that fix two bugs and add one enhancement are nowavailable for Red Hat Enterprise Virtualization Hypervisor 7. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

The qemu-kvm-rhev packages provide the user-spacecomponent for running virtual machines using KVM in environments managed by RedHat Enterprise Virtualization Manager.This update fixes the following bugs:* The fix for CVE-2016-5403 caused migrating guest instances to fail with a"Virtqueue size exceeded" error message. With this update, the value of thevirtualization queue is recalculated after the migration, and the describedproblem no longer occurs. (BZ#1374623)* Due to a race condition in the virtio-blk dataplane, live migration of a guestin some cases failed with a "Virtqueue size exceeded" error message.

This updateprevents the race condition from occurring, and thus allows live migration towork more reliably. (BZ#1380320)In addition, this update adds the following enhancement:* It is now possible to specify the virtio data buffer limit between a guest andthe QEMU emulator.

To do this, change the value of the <driverrx_queue_size='N'/> parameter in the guest's domain XML file, where N can befrom 256 to 1024. (BZ#1375642)Users of qemu-kvm-rhev are advised to upgrade to these updated packages, whichfix these bugs.

After installing this update, shut down all running virtualmachines. Once all virtual machines have shut down, start them again for thisupdate to take effect. Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Virtualization ( v.4 for RHEL 7) SRPMS: qemu-kvm-rhev-2.3.0-31.el7_2.23.src.rpmFile outdated by:  RHBA-2016:2673     MD5: 445e1bbf6cdba60ffcfd199a7b03212dSHA-256: a020e85100802fa2a7d53d8ef32e046234e44bd8782f4b4ac9e553836bd4e2fb   x86_64: libcacard-devel-rhev-2.3.0-31.el7_2.23.x86_64.rpm     MD5: 955d22794521189bac78beb4bdfd0677SHA-256: 549ac627db645908035be76c390398512daa5afd26aa22547bb1445741a2d179 libcacard-rhev-2.3.0-31.el7_2.23.x86_64.rpm     MD5: 8c5f07edcdabba61912a9ccd3d23c24eSHA-256: cc89da466898746bef068e21c38795d4e6b6fe6ae342068e9107c3cc28a101a3 libcacard-tools-rhev-2.3.0-31.el7_2.23.x86_64.rpm     MD5: 96d3419c1102c1ce381837f16fbf22e8SHA-256: 0c15e94faba3736c95b20af77ee1a3ad4c1d75ed45eba5dd1b8eda353bd8c160 qemu-img-rhev-2.3.0-31.el7_2.23.x86_64.rpmFile outdated by:  RHBA-2016:2673     MD5: aa1c1993dc405fb3be0d689ebc815f20SHA-256: 555ac212e75147ebbc5fa966455dfcad9957f8dcbd8d312a7a99bed3a8790311 qemu-kvm-common-rhev-2.3.0-31.el7_2.23.x86_64.rpmFile outdated by:  RHBA-2016:2673     MD5: b5eb187f17a6aaf487cc4be17b93e8e0SHA-256: c6f9ece721acf2586d2d1e6d5600a0166efed27797c31334f7f8c718fdd3cb0f qemu-kvm-rhev-2.3.0-31.el7_2.23.x86_64.rpmFile outdated by:  RHBA-2016:2673     MD5: ef7e49de53ea0566234c450f6b6e2d5bSHA-256: ece0f9dcaba2ec275728a9435afd35970206a351a0ccbd6a21f791296737d05b qemu-kvm-tools-rhev-2.3.0-31.el7_2.23.x86_64.rpmFile outdated by:  RHBA-2016:2673     MD5: 2af92351f986a08ae03443bfb37327cbSHA-256: 259991a03211ab83e58ecc587f422ceff4a19fde89a9785026cb05d79eb8c402   (The unlinked packages above are only available from the Red Hat Network) 1374623 - RHSA-2016-1756 breaks migration of instances1380310 - match the OEM ID and OEM Table ID fields of the FADT and the RSDT to those of the SLIC [7.2.z]1380320 - Race condition during virtio-blk dataplane stop triggers "Virtqueue size exceeded" These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
Google’s November Android Security Bulletin, released Monday, patched 15 critical vulnerabilities and addressed 85 CVEs overall.

But conspicuously absent is a fix for the Linux race condition vulnerability known as Dirty Cow (Copy-on-Write) that also impacts Android. While Google didn’t issue an official fix for the Dirty Cow vulnerability (CVE-2016-5195), it did release “supplemental” firmware updates for its Nexus and Pixel handsets.

According to Michael Cherny, head of security research at Aqua Security, Samsung also released the fix for Dirty Cow this month (SMR-NOV-2016), while other handset makers have not. According to Google, patches for Dirty Cow will be formally introduced for other Android handset makers in its December Android Security Bulletin. It should be noted, starting with this month’s Android Security Bulletin, Google introduced new categories for patches and fixes that include, partial, complete and supplemental.

The new patch levels, Google said, are meant to “provide Android partners with the flexibility to more quickly fix a subset of vulnerabilities that are similar across all Android devices.” While “partial” and “complete” designations are self evident “supplemental security patch levels are provided to identify devices that contain fixes for issues that were publicly disclosed after the patch level was defined.” Google said. Dirty Cow was the only “supplemental” security patch level issued for this bulletin. Google patched 12 critical elevation of privileges vulnerabilities, nine of those tied to flaws found within the Android subsystem kernels.
Some of those flaws, according to Google, are related to the Android SCSI driver (CVE-2015-8962), media driver (CVE-2016-7913) and Android’s memory manager called ION (CVE-2016-6737). The ION vulnerability (AKA Drammer) was reported last month by VUSec Lab.

The flaw is tied to a problem with Android hardware and DRAM memory modules that can allow attackers to get root-level access to target devices.

The vulnerability could give an attacker root access to millions of Android handsets including Nexus, Samsung, LG and Motorola. Particularly problematic, according to Google, is NVIDIA’s GPU driver that Google said had seven elevation of privilege vulnerabilities. “An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel.

This issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device,” Google wrote in its security bulletin. Google also patched five critical remote code execution vulnerabilities tied to Android device components such as the problem-plagued Mediaserver (CVE-2016-6699) component.

The vulnerability, found by researcher Weichao Sun of Alibaba, could enable an attacker using a specially crafted media file to cause memory corruption within the Mediaserver component and execute remote code. Three critical patches were also reported for Qualcomm components just a month after Google issued the last patch for its high-profile QuadRooter vulnerability putting 900 million Android handsets at risk.

The new Qualcomm risks, according to Google, are tied to a Qualcomm crypto driver flaw (CVE-2016-6725) and an elevation of privilege vulnerability in Qualcomm’s bootloader (CVE-2016-6729). “We have had no reports of active customer exploitation or abuse of these newly reported issues,” Google said of its security bulletins. A number of security researchers are acknowledged by Google for discovering the vulnerabilities.

Among the most prolific is Gengjia Chen and “Pif” of IceSword Lab that reported twelve vulnerabilities followed by five researchers that make up the CORE Team, with eight reported November vulnerabilities.
Ron Amadeoreader comments 16 Share this story Android users waiting for a fix for a newly discovered flaw that allows apps to bypass key operating-system security protections will have to wait at least another month.

The just released patch batch for November, inexplicably, won't include it. The so-called escalation-of-privilege vulnerability dubbed Dirty Cow was introduced into the core of the Linux kernel in 2007, shortly before Google engineers incorporated the open-source operating system into Android.

That means the bug, formally indexed as CVE-2016-5195, affects every version of Android since its inception.

The flaw remained hidden from public view until October 19, when it was disclosed under a coordinated release that was designed to ensure a fix was ready before most people knew about it.

The Android Security Bulletin scheduled to be automatically pushed to select handsets sometime this month, however, won't fix the flaw. "It's a pretty big deal because it's very easy to exploit," Daniel Micay, a developer of the Android-based CopperheadOS for mobile phones, told Ars. "Unlike a memory corruption bug, there are not really any mitigations for it. [Google] can't claim that mitigations stand in the way of easy exploitation for this bug (that's a dubious claim when they do make it, but for this they can't do it)." The vulnerability is already being exploited maliciously in the wild against Linux servers so that untrusted users can gain unfettered "root" privileges.

Attackers are also combining the exploit with attacks that trigger separate Linux vulnerabilities to make them much more potent than they'd otherwise be. Micay said Dirty Cow—so named because the underlying race condition bug resides in a memory management technique known as copy on write—is being actively used by Android users who want to root their phones so they bypass limitations imposed by manufacturers and carriers. He said it's also possible exploits are being surreptitiously folded into malicious apps so that they can circumvent application sandboxing and similar Android security protections. If some malicious rooting apps manage to sneak their way into the official Google Play app bazaar, it wouldn't be the first time.
In January, researchers found 13 Google Play apps that surreptitiously exploited rooting vulnerabilities. One of the apps was downloaded more than 1 million times before Google removed it.

Another batch of malicious Google Play apps reported in June had the ability to root virtually any device running Android 5.1 or earlier, which at the time accounted for 90 percent of the Android user base. Among the fixes announced in the November security bulletin is one for yet another Stagefright-style vulnerability in an Android component known as mediaserver. Rated critical, it allows attackers to remotely execute malicious code.

A separate critical vulnerability fixed this month in the libzipfile component allows for escalation of privileges.

A Google spokesman told Ars the Dirty Cow patch will be released in December.

As is the case with all security fixes Google releases for Android, it will be available only for Nexus devices and a small list of other qualifying handsets.

The spokesman didn't say why the Dirty Cow patch wasn't included in the patch bundle being released this month. Update: As Hiroshi Lockheimer, SVP of Android, Chrome OS, and Google Play, explained in last month's interview with Ars Reviews Editor Ron Amadeo, monthly Android security patches are released a month after they have been made available to manufacturers. "The patches go out to the partners first, and then a month later they'll show up on the Nexus devices," Lockheimer said. OEMs "can, at the same time, roll out their patches as well."
Updated qemu-kvm-rhev packages that fix several bugs and add variousenhancements are now available for Red Hat Virtualization Hypervisor 7. Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems.

Th...
MySQL, MariaDB, and PerconaDB administrators need to check their database versions, as attackers can chain two critical vulnerabilities and completely take over the server hosting the database. The two critical vulnerabilities, which can lead to arbitr...