安全公告详情

NS-SA-2020-0008

2020-01-13 14:12:46

简介

important: kernel-rt/tcpdump security update

严重级别

important

主题

An update for kernel-rt/tcpdump is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel-rt: The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. This variant of the kernel has numerous debugging options enabled. It should only be installed when trying to gather additional information on kernel bugs, as some of these options impact performance noticably.
tcpdump: Tcpdump is a command-line tool for monitoring network traffic. Tcpdump can capture and display the packet headers on a particular network interface or on all interfaces. Tcpdump can display all of the packet headers, or just the ones that match particular criteria. Install tcpdump if you need a program to monitor network traffic.


Security Fix(es):
kernel-rt: A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.(CVE-2019-0154)
kernel-rt: A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.(CVE-2019-0155)
kernel-rt: If the Wake-up on Wireless LAN functionality is configured in the brcmfmac driver, which only works with Broadcom FullMAC chipsets, a malicious event frame can be constructed to trigger a heap buffer overflow in the brcmf_wowl_nd_results() function. This vulnerability can be exploited by compromised chipsets to compromise the host, or when used in combination with another brcmfmac driver flaw (CVE-2019-9503), can be used remotely. This can result in a remote denial of service (DoS). Due to the nature of the flaw, a remote privilege escalation cannot be fully ruled out.(CVE-2019-9500)
kernel-rt: bugfix
tcpdump: In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.(CVE-2018-19519)
tcpdump: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F8.

影响组件

  • kernel-rt
  • tcpdump

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["kernel-rt-debug-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-doc-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.noarch.rpm","kernel-rt-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debuginfo-common-x86_64-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm"],"source":"kernel-rt-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.src.rpm"},{"binary":["tcpdump-4.9.2-4.el7_7.1.x86_64.rpm","tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm"],"source":"tcpdump-4.9.2-4.el7_7.1.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["kernel-rt-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debug-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-debuginfo-common-x86_64-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-doc-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.noarch.rpm","kernel-rt-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-devel-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-kvm-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm","kernel-rt-trace-kvm-debuginfo-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.x86_64.rpm"],"source":"kernel-rt-3.10.0-957.27.2.rt56.940.el7.cgslv5_5.11.100.g2ad3f85.src.rpm"},{"binary":["tcpdump-4.9.2-4.el7_7.1.x86_64.rpm","tcpdump-debuginfo-4.9.2-4.el7_7.1.x86_64.rpm"],"source":"tcpdump-4.9.2-4.el7_7.1.src.rpm"}]}]}

CVE

参考