kernel-2.6.32-754.35.3.el6
エラータID: AXSA:2021-1746:10
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
kernel: increase slab leak leads to DoS (CVE-2021-20265)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2020-29661
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
CVE-2021-20265
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
CVE-2021-27364
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
CVE-2021-27365
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
Bug Fix(es):
Enable CI and changelog for GitLab workflow
Update packages.
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
N/A
SRPMS
- kernel-2.6.32-754.35.3.el6.src.rpm
MD5: c09ce77504a8ab977be46efc9f568545
SHA-256: c10feaaa7145f834fba98376d81a99de4fbe060b59361d1bbb4399095f2dd4ca
Size: 128.90 MB
Asianux Server 4 for x86
- kernel-2.6.32-754.35.3.el6.i686.rpm
MD5: b8f95fedc13d965f458eb9c3da8d68f3
SHA-256: 9968798c09b704f5f046b3c6cd2f942a3b55504300a6f40a52df14e029f94d86
Size: 30.11 MB - kernel-abi-whitelists-2.6.32-754.35.3.el6.noarch.rpm
MD5: 13fcee10f36ae18b7f837cfa76c3f423
SHA-256: 2081532f1038f177aa6e628e72c8cb85bb3e7a854d8e0afc01c7a93395f2fd06
Size: 3.85 MB - kernel-debug-2.6.32-754.35.3.el6.i686.rpm
MD5: 8a34d4a0841cd4fa7d1f77d9f3f43f6f
SHA-256: bb3c570d29fe3e8de006eea2cdfb4de29244587d95e7e41d29f9443bd1749a43
Size: 30.90 MB - kernel-debug-devel-2.6.32-754.35.3.el6.i686.rpm
MD5: d5a328b9f1828bd03dba729c78efda4e
SHA-256: 33b9e8537a49b1b4c21d4d3055333af9a70b367751de8828a633f40d3d99d09f
Size: 10.84 MB - kernel-devel-2.6.32-754.35.3.el6.i686.rpm
MD5: a5bc6119e599e3e336bbc0984ce31dc2
SHA-256: 71b6c580b11d2a0013705395fd3fb3762a98afa0a7751c8ddb8c754d1872b506
Size: 10.80 MB - kernel-doc-2.6.32-754.35.3.el6.noarch.rpm
MD5: efaf12ee935731727a7e38196f500f31
SHA-256: eb407846f1ef9b85fe2f9c0d889446b08bb7d0c9d4b95e35ec12facf21b05136
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.3.el6.noarch.rpm
MD5: 7729ab215e6d52e0ab1698d5eb604341
SHA-256: 6aa4237630fbe29fb57ada5b7792a2331bb1aafe570c60c008c099fd2737f70c
Size: 28.91 MB - kernel-headers-2.6.32-754.35.3.el6.i686.rpm
MD5: 9c03ead386356f2c923c9c1a11da4292
SHA-256: 76a4badaae3a870cdb033b9a2573f0a94d4ad486ba6f57e0f5f99ad9eccf4afc
Size: 4.57 MB - perf-2.6.32-754.35.3.el6.i686.rpm
MD5: 74c95ec19d142a08f923e4105350e604
SHA-256: bdbc0eb5bc1e4dbd934618f89738060e5893960056e5a88be854bb56a7336505
Size: 4.80 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: ebaa1d3734da05dbfc70dec7dfe98bd6
SHA-256: 9dd912fbbb906fe05a8e13d01fdad85edd9ccf27044828fc4f09674dd093b515
Size: 32.41 MB - kernel-abi-whitelists-2.6.32-754.35.3.el6.noarch.rpm
MD5: 4dc4bd2676d3f76b32d74045bb0b690d
SHA-256: 01ff683af590a5212acdba242fc901e2b6962107880a8849ef50e454eb8641da
Size: 3.85 MB - kernel-debug-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 10d0494c647f5b374e96ef29bac729fc
SHA-256: ed1ca141ac4f587f974bfdcbae62846d2eb27dc626648936bd559ec886822fc9
Size: 33.29 MB - kernel-debug-devel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: b053444a07061c6fbab7f34a96389cca
SHA-256: a88e70284e6cca6261e37fc76b6dee0940212ad9698c11dc736a1562a31bf887
Size: 10.89 MB - kernel-devel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 4bf106b0a57bc94b689ced9457810e2d
SHA-256: 731caf7567e58808d6e26b5c783e5f1e605c0ddbaa807a0324eb2ce1301154d8
Size: 10.85 MB - kernel-doc-2.6.32-754.35.3.el6.noarch.rpm
MD5: 5633d571bd6885035073e781c0825b16
SHA-256: bc6752efa5e89e550ca5f6a4d6b0e9a3fe64c0f1eaededf95d034c088493b944
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.3.el6.noarch.rpm
MD5: e5f41b4b80123cba789fec114fe6e8bb
SHA-256: 7253c0c261798b36f12c05e61076b6b19f0874b6816ff750b35eff8472924b5a
Size: 28.91 MB - kernel-headers-2.6.32-754.35.3.el6.x86_64.rpm
MD5: d872563800f0f3f9841c159053bbb3ca
SHA-256: f5ea86f0b88431d5ec6a81bb7c571008f334d2d443e9b7682b797ffbac3f2c65
Size: 4.57 MB - perf-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 375ca255e0f4dd0bb7fb8e75d397cbd6
SHA-256: 1e8016f1747955be14f2e7e4252be07edcfd004e6faa42eb24bbf6bac26d217f
Size: 4.77 MB