kexec-tools-1.102pre-154.0.1.AXS3
エラータID: AXSA:2012-274:02
Release date:
Wednesday, March 7, 2012 - 13:37
Subject:
kexec-tools-1.102pre-154.0.1.AXS3
Affected Channels:
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity:
High
Description:
kexec-tools provides /sbin/kexec binary that facilitates a new kernel to boot using the kernel's kexec feature either on a normal or a panic reboot. This package contains the /sbin/kexec binary and ancillary utilities that together form the userspace component of the kernel's kexec feature.
Security issues fixed with this release:
CVE-2011-3588
CVE-2011-3589
CVE-2011-3590
No information available at the time of writing, please refer to the CVE links below.
Solution:
Update packages.
CVEs:
CVE-2011-3589
The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, uses world-readable permissions for vmcore files, which allows local users to obtain sensitive information by inspecting the file content, as demonstrated by a search for a root SSH key.
The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, uses world-readable permissions for vmcore files, which allows local users to obtain sensitive information by inspecting the file content, as demonstrated by a search for a root SSH key.
CVE-2011-3588
The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables the StrictHostKeyChecking option, which allows man-in-the-middle attackers to spoof kdump servers, and obtain sensitive core information, by using an arbitrary SSH key.
The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables the StrictHostKeyChecking option, which allows man-in-the-middle attackers to spoof kdump servers, and obtain sensitive core information, by using an arbitrary SSH key.
CVE-2011-3590
The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, includes all of root's SSH private keys within a vmcore file, which allows context-dependent attackers to obtain sensitive information by inspecting the file content.
The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, includes all of root's SSH private keys within a vmcore file, which allows context-dependent attackers to obtain sensitive information by inspecting the file content.
Additional Info:
N/A
Download:
SRPMS
- kexec-tools-1.102pre-154.0.1.AXS3.src.rpm
MD5: 7813b561b502ff634af98933aaf3928b
SHA-256: a3c3d4874060f9a1f27927f150a3714865abfdd85d4eb518d65c4fb63c802be8
Size: 429.60 kB
Asianux Server 3 for x86
- kexec-tools-1.102pre-154.0.1.AXS3.i386.rpm
MD5: 6eeb213c9edc0d905d041ba53ae6be56
SHA-256: 2dfbe2eef6bb817be037ef3a575b277b04a933714a62f4d85e63a8e19018c903
Size: 556.22 kB
Asianux Server 3 for x86_64
- kexec-tools-1.102pre-154.0.1.AXS3.x86_64.rpm
MD5: a03f8eeb7f8b9b008c9723bcb2b47f54
SHA-256: 43b948bdc9a048d17347f714deed26a6b5d4f2eaffa8d5b4f5f0b8478eab7d0c
Size: 572.08 kB