kernel-2.6.32-754.35.3.el6
エラータID: AXSA:2021-1746:10
リリース日:
2021/05/20 Thursday - 10:56
題名:
kernel-2.6.32-754.35.3.el6
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- drivers/tty/tty_jobctrl.c には、tty サブシステムにロックの問題があるため、
TIOCSPGRP に対する解放後利用の攻撃を可能とする脆弱性が存在します。
(CVE-2020-29661)
- net/unix/af_unix.c の unix_stream_recvmsg() には、シグナルが保留中の場合に
メモリリソースを解放する方法に問題があるため、特権を持たないローカルユーザーにより、
サービス拒否 (メモリ枯渇、システムクラッシュ) 状態にされる脆弱性が存在します。
(CVE-2021-20265)
- drivers/scsi/scsi_transport_iscsi.c には、範囲外のメモリアクセスの問題があるため、
非特権ユーザーにより、 巧妙に細工された Netlink メッセージを介して、
機密情報の読み取りやサービス拒否状態にされる脆弱性が存在します。
(CVE-2021-27364)
- iSCSI サブシステムには、特定の iSCSI データ構造において適切な長さの
制約やチェックがなく、PAGE_SIZE 値を超えてしまう問題があるため、
非特権ユーザーが最大のデータ長を持つ iSCSI と関連する Netlink メッセージを
送ることによりヒープバッファオーバーフローが発生し、サービス拒否状態にされる
脆弱性が存在します。 (CVE-2021-27365)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-29661
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
CVE-2021-20265
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
CVE-2021-27364
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
CVE-2021-27365
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-2.6.32-754.35.3.el6.src.rpm
MD5: c09ce77504a8ab977be46efc9f568545
SHA-256: c10feaaa7145f834fba98376d81a99de4fbe060b59361d1bbb4399095f2dd4ca
Size: 128.90 MB
Asianux Server 4 for x86
- kernel-2.6.32-754.35.3.el6.i686.rpm
MD5: b8f95fedc13d965f458eb9c3da8d68f3
SHA-256: 9968798c09b704f5f046b3c6cd2f942a3b55504300a6f40a52df14e029f94d86
Size: 30.11 MB - kernel-abi-whitelists-2.6.32-754.35.3.el6.noarch.rpm
MD5: 13fcee10f36ae18b7f837cfa76c3f423
SHA-256: 2081532f1038f177aa6e628e72c8cb85bb3e7a854d8e0afc01c7a93395f2fd06
Size: 3.85 MB - kernel-debug-2.6.32-754.35.3.el6.i686.rpm
MD5: 8a34d4a0841cd4fa7d1f77d9f3f43f6f
SHA-256: bb3c570d29fe3e8de006eea2cdfb4de29244587d95e7e41d29f9443bd1749a43
Size: 30.90 MB - kernel-debug-devel-2.6.32-754.35.3.el6.i686.rpm
MD5: d5a328b9f1828bd03dba729c78efda4e
SHA-256: 33b9e8537a49b1b4c21d4d3055333af9a70b367751de8828a633f40d3d99d09f
Size: 10.84 MB - kernel-devel-2.6.32-754.35.3.el6.i686.rpm
MD5: a5bc6119e599e3e336bbc0984ce31dc2
SHA-256: 71b6c580b11d2a0013705395fd3fb3762a98afa0a7751c8ddb8c754d1872b506
Size: 10.80 MB - kernel-doc-2.6.32-754.35.3.el6.noarch.rpm
MD5: efaf12ee935731727a7e38196f500f31
SHA-256: eb407846f1ef9b85fe2f9c0d889446b08bb7d0c9d4b95e35ec12facf21b05136
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.3.el6.noarch.rpm
MD5: 7729ab215e6d52e0ab1698d5eb604341
SHA-256: 6aa4237630fbe29fb57ada5b7792a2331bb1aafe570c60c008c099fd2737f70c
Size: 28.91 MB - kernel-headers-2.6.32-754.35.3.el6.i686.rpm
MD5: 9c03ead386356f2c923c9c1a11da4292
SHA-256: 76a4badaae3a870cdb033b9a2573f0a94d4ad486ba6f57e0f5f99ad9eccf4afc
Size: 4.57 MB - perf-2.6.32-754.35.3.el6.i686.rpm
MD5: 74c95ec19d142a08f923e4105350e604
SHA-256: bdbc0eb5bc1e4dbd934618f89738060e5893960056e5a88be854bb56a7336505
Size: 4.80 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: ebaa1d3734da05dbfc70dec7dfe98bd6
SHA-256: 9dd912fbbb906fe05a8e13d01fdad85edd9ccf27044828fc4f09674dd093b515
Size: 32.41 MB - kernel-abi-whitelists-2.6.32-754.35.3.el6.noarch.rpm
MD5: 4dc4bd2676d3f76b32d74045bb0b690d
SHA-256: 01ff683af590a5212acdba242fc901e2b6962107880a8849ef50e454eb8641da
Size: 3.85 MB - kernel-debug-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 10d0494c647f5b374e96ef29bac729fc
SHA-256: ed1ca141ac4f587f974bfdcbae62846d2eb27dc626648936bd559ec886822fc9
Size: 33.29 MB - kernel-debug-devel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: b053444a07061c6fbab7f34a96389cca
SHA-256: a88e70284e6cca6261e37fc76b6dee0940212ad9698c11dc736a1562a31bf887
Size: 10.89 MB - kernel-devel-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 4bf106b0a57bc94b689ced9457810e2d
SHA-256: 731caf7567e58808d6e26b5c783e5f1e605c0ddbaa807a0324eb2ce1301154d8
Size: 10.85 MB - kernel-doc-2.6.32-754.35.3.el6.noarch.rpm
MD5: 5633d571bd6885035073e781c0825b16
SHA-256: bc6752efa5e89e550ca5f6a4d6b0e9a3fe64c0f1eaededf95d034c088493b944
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.3.el6.noarch.rpm
MD5: e5f41b4b80123cba789fec114fe6e8bb
SHA-256: 7253c0c261798b36f12c05e61076b6b19f0874b6816ff750b35eff8472924b5a
Size: 28.91 MB - kernel-headers-2.6.32-754.35.3.el6.x86_64.rpm
MD5: d872563800f0f3f9841c159053bbb3ca
SHA-256: f5ea86f0b88431d5ec6a81bb7c571008f334d2d443e9b7682b797ffbac3f2c65
Size: 4.57 MB - perf-2.6.32-754.35.3.el6.x86_64.rpm
MD5: 375ca255e0f4dd0bb7fb8e75d397cbd6
SHA-256: 1e8016f1747955be14f2e7e4252be07edcfd004e6faa42eb24bbf6bac26d217f
Size: 4.77 MB