kernel-2.6.32-754.35.4.el6
エラータID: AXSA:2021-2276:17
リリース日:
2021/08/02 Monday - 16:20
題名:
kernel-2.6.32-754.35.4.el6
影響のあるチャネル:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- 一部のインテルグラフィックドライバ、およびファームウェアには、整数オーバーフローの
問題があるため、特権ユーザーによりローカルアクセスを介して、権限の昇格を可能とする
脆弱性が存在します。 (CVE-2020-12362)
- PI futexes には、失敗処理中にカーネルスタックの解放後利用の問題があるため、
ローカルユーザーにより、カーネル内で任意のコード実行が可能となる脆弱性が存在します。
(CVE-2021-3347)
- fs/seq_file.c には、seq バッファーの割り当てを適切に制限していないことにより
整数オーバーフローや範囲外書き込みが発生する問題があるため、ローカルの
特権のないユーザーにより、システムクラッシュや機密情報の漏洩、特権昇格を
可能とする脆弱性が存在します。 (CVE-2021-33909)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2020-12362
Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
CVE-2021-3347
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
CVE-2021-33909
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
追加情報:
N/A
ダウンロード:
SRPMS
- kernel-2.6.32-754.35.4.el6.src.rpm
MD5: a5f7849426a956b70c9d8a8ad53f6ad1
SHA-256: b1c826cd4de13bcf8e73baa171a50bfeddc805a51e103fa944083a6a960a89aa
Size: 128.90 MB
Asianux Server 4 for x86
- kernel-2.6.32-754.35.4.el6.i686.rpm
MD5: e80d7d185615904ffdd6fb54e22d1fc7
SHA-256: c42e55cd3e960636e4711472e5005085cbea0d4acb1d1d7eff453bc22a71d249
Size: 30.11 MB - kernel-abi-whitelists-2.6.32-754.35.4.el6.noarch.rpm
MD5: 91824b610f82d9715b8f8865ef12872d
SHA-256: 414a6a0eeea2946ca7739b401866741b9c9e1ee16f9c7b95605d9d0589f01280
Size: 3.85 MB - kernel-debug-2.6.32-754.35.4.el6.i686.rpm
MD5: 6ef116e366949a7557fb3c15b06edb83
SHA-256: 435d2ad322b237bd8095f87bb5b2d97e60e5277807f0548589f5fda29b39ba3a
Size: 30.90 MB - kernel-debug-devel-2.6.32-754.35.4.el6.i686.rpm
MD5: bb70532eb6001a40cd24995290faa74e
SHA-256: 8b2af2e29b7a883f222577048f54bf5287867658a0f79d3e3324309ca59d82d6
Size: 10.84 MB - kernel-devel-2.6.32-754.35.4.el6.i686.rpm
MD5: 8e1baea7f6e6d8a8322d9eba8436a069
SHA-256: 8be129502059b2dc3419bf87f93fa40561575c430e0302935291c02e300c8514
Size: 10.80 MB - kernel-doc-2.6.32-754.35.4.el6.noarch.rpm
MD5: 59f23737c6c09aefa5bf478caa688b42
SHA-256: 80a5ddf8b7988af2fc69fef3a0a85d70d4c0ff6e7fbbfa008232dfe46e0a0751
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.4.el6.noarch.rpm
MD5: 0becb3b5bc60c22c5f67b65a0267273c
SHA-256: 53cee8bafc6a2668270fd8fbed095090bf3d207832f8b046abc16072b764a146
Size: 28.91 MB - kernel-headers-2.6.32-754.35.4.el6.i686.rpm
MD5: 4d23d53beb7083f071ce52b92f67f71a
SHA-256: eeb0360d293fa6d8e96d037ea644e60f3f4834f4fb714599622244bb0bfa0c33
Size: 4.57 MB - perf-2.6.32-754.35.4.el6.i686.rpm
MD5: f83e9d1a9bc2e757f0fd630914c9f632
SHA-256: 8cb2f9d34c13e03b594723e469ac5b6b533f8fb29144f433e25ec5d913fb396e
Size: 4.80 MB
Asianux Server 4 for x86_64
- kernel-2.6.32-754.35.4.el6.x86_64.rpm
MD5: 1e5df81ef842b6728077da54e3bfd0d1
SHA-256: 9763c758c68ff1a126b2c8a6fdcd343ce8145350cab350eafc7d1be01b6317ec
Size: 32.41 MB - kernel-abi-whitelists-2.6.32-754.35.4.el6.noarch.rpm
MD5: 5418e860c638a595881c20a8f147f042
SHA-256: 00d65a7befbe83c02836e5b9f86992ee4613d4eb4719532b9eeb28726a994217
Size: 3.85 MB - kernel-debug-2.6.32-754.35.4.el6.x86_64.rpm
MD5: b94c35fa2135f583741db9a92187a8e6
SHA-256: dc63330f8c753e3118be25a3e3c9fd4ef635a629ce54811c88fa39585262e9fb
Size: 33.29 MB - kernel-debug-devel-2.6.32-754.35.4.el6.x86_64.rpm
MD5: 458ca7c50dc3174036b17b031673e403
SHA-256: 037d995c54a0f36bac0732b70dd6ec3b284e697de1825a2cab03144648a03c0a
Size: 10.89 MB - kernel-devel-2.6.32-754.35.4.el6.x86_64.rpm
MD5: 1c2780248a81b08946432c93dbc2b5d6
SHA-256: 7bf4e1cc0e8840e5446d29754e7b1c91ebc6eec192d88eb9bf1185310ce1f603
Size: 10.84 MB - kernel-doc-2.6.32-754.35.4.el6.noarch.rpm
MD5: 9835a6fb989fe28280c4138e297c7410
SHA-256: b6b290924dbbf5934b63808307fea71a98e4a7bced8090179d370dcd63f30100
Size: 12.44 MB - kernel-firmware-2.6.32-754.35.4.el6.noarch.rpm
MD5: 4dd4b2a99e7dd944d7b92a79241e7fee
SHA-256: 75546f3881eacee3a8109eff33e0def8575d7688d84818e6370dd9749b4e8f69
Size: 28.91 MB - kernel-headers-2.6.32-754.35.4.el6.x86_64.rpm
MD5: 029c80b2f5a3a4bc58769107f0a3f063
SHA-256: 43401fc6faa86dfb1cda3e457faed71ebd74dee8da8ddb5751f462909dca879d
Size: 4.57 MB - perf-2.6.32-754.35.4.el6.x86_64.rpm
MD5: 1ff7f690d5af508c1d2c6199589064e4
SHA-256: 9582fae18611586731ff6838c693156981c1f17ce3098939b06c9f95006d58bb
Size: 4.77 MB