安全公告详情

NS-SA-2020-0073

2020-12-08 09:12:10

简介

important: kernel/doxygen security update

严重级别

important

主题

An update for kernel/doxygen is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: The python-perf package contains a module that permits applications written in the Python programming language to use the interface to manipulate perf events.
doxygen: Doxygen can generate an online class browser (in HTML) and/or a reference manual (in LaTeX) from a set of documented source files. The documentation is extracted directly from the sources. Doxygen can also be configured to extract the code structure from undocumented source files.


Security Fix(es):
kernel: A use-after-free vulnerability was found in the Linux kernel’s implementation of blktrace in the __blk_add_trace function. A local attacker with permissions to run block trace instructions against a device can create a situation where the core block_trace object is used after it is freed. The attacker can pre-groom memory to race this use-after-free to create a condition where the memory is corrupted and cause privilege escalation.(CVE-2019-19768)
kernel: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)
kernel: bugfix
doxygen: Insufficient sanitization of the query parameter in templates/html/search_opensearch.php could lead to reflected cross-site scripting or iframe injection.(CVE-2016-10245)
doxygen: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F25B5.

影响组件

  • kernel
  • doxygen

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["kernel-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.noarch.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.noarch.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.45.762.gcf9329a.src.rpm"},{"binary":["doxygen-debuginfo-1.8.5-4.el7.x86_64.rpm","doxygen-doxywizard-1.8.5-4.el7.x86_64.rpm","doxygen-latex-1.8.5-4.el7.x86_64.rpm","doxygen-1.8.5-4.el7.x86_64.rpm"],"source":"doxygen-1.8.5-4.el7.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["kernel-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.noarch.rpm","kernel-core-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debug-core-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debug-modules-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.noarch.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-modules-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.47.655.gf6ce0e6.lite.src.rpm"},{"binary":["doxygen-debuginfo-1.8.5-4.el7.x86_64.rpm","doxygen-latex-1.8.5-4.el7.x86_64.rpm","doxygen-1.8.5-4.el7.x86_64.rpm","doxygen-doxywizard-1.8.5-4.el7.x86_64.rpm"],"source":"doxygen-1.8.5-4.el7.src.rpm"}]}]}

CVE

参考