安全公告详情

NS-SA-2020-0108

2020-12-08 09:15:38

简介

important: kernel/zsh security update

严重级别

important

主题

An update for kernel/zsh is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
zsh: The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell (the Korn shell), but includes many enhancements. Zsh supports command line editing, built-in spelling correction, programmable command completion, shell functions (with autoloading), a history mechanism, and more.


Security Fix(es):
kernel: A vulnerability was found in the Linux kernel’s CX24116 tv-card driver, where an out of bounds read occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. An attacker could use this flaw to leak kernel private information to userspace.(CVE-2015-9289)
kernel: The KEYS subsystem in the Linux kernel omitted an access-control check when writing a key to the current task's default keyring, allowing a local user to bypass security checks to the keyring. This compromises the validity of the keyring for those who rely on it.(CVE-2017-17807)
kernel: A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).(CVE-2018-20169)
kernel: A flaw was found in the Linux kernel's implementation of networking tunnel device ioctl. A local attacker can cause a denial of service (NULL pointer dereference and panic) via an ioctl (TUNSETIFF) call with a dev name containing a / character.(CVE-2018-7191)
kernel: A flaw was found in the Linux kernel's implementation of the FUSE filesystem, where it allows a page reference counter overflow. If a page reference counter overflows into a negative value, it can be placed back into the "free" list for reuse by other applications. This flaw allows a local attacker who can manipulate memory page reference counters to cause memory corruption and possible privilege escalation by triggering a use-after-free condition. The current attack requires the system to have approximately 140 GB of RAM for this attack to be performed. It may be possible that the attack can occur with fewer memory requirements.(CVE-2019-11487)
kernel: A flaw was found in the Linux kernel’s implementation of Extended Display Identification Data (EDID) technology. A firmware identifier string is duplicated with the kstrdup function, and the allocation may fail under very low memory conditions. An attacker could abuse this flaw by causing a Denial of Service and crashing the system.(CVE-2019-12382)
kernel: A vulnerability was found in the arch/x86/lib/insn-eval.c function in the Linux kernel. An attacker could corrupt the memory due to a flaw in use-after-free access to an LDT entry caused by a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.(CVE-2019-13233)
kernel: A vulnerability was found in the Linux kernel’s floppy disk driver implementation. A local attacker with access to the floppy device could call set_geometry in drivers/block/floppy.c, which does not validate the sect and head fields, causing an integer overflow and out-of-bounds read. This flaw may crash the system or allow an attacker to gather information causing subsequent successful attacks.(CVE-2019-14283)
kernel: A vulnerability was found in the Linux kernel's Marvell WiFi chip driver. Where, while parsing vendor-specific informational attributes, an attacker on the same WiFi physical network segment could cause a system crash, resulting in a denial of service, or potentially execute arbitrary code. This flaw affects the network interface at the most basic level meaning the attacker only needs to affiliate with the same network device as the vulnerable system to create an attack path.(CVE-2019-14816)
kernel: A heap-based buffer overflow was discovered in the Linux kernel's Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.(CVE-2019-14895)
kernel: The fix for CVE-2019-11599 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.(CVE-2019-14898)
kernel: A heap overflow flaw was found in the Linux kernel's Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.(CVE-2019-14901)
kernel: A flaw that allowed an attacker to leak kernel memory was found in the network subsystem where an attacker with permissions to create tun/tap devices can create a denial of service and panic the system.(CVE-2019-15916)
kernel: A vulnerability was found in the Linux kernel's generic WiFi ESSID handling implementation. The flaw allows a system to join a wireless network where the ESSID is longer than the maximum length of 32 characters, which can cause the system to crash or execute code.(CVE-2019-17133)
kernel: A flaw was found in the Linux kernel's implementation of the RealTek wireless drivers WiFi-direct (or WiFi peer-to-peer) driver implementation. When the RealTek wireless networking hardware is configured to accept WiFi-Direct or WiFi P2P connections, an attacker within the wireless network connectivity radio range can exploit a flaw in the WiFi-direct protocol known as "Notice of Absence" by creating specially crafted frames which can then corrupt kernel memory as the upper bounds on the length of the frame is unchecked and supplied by the incoming packet.(CVE-2019-17666)
kernel: A flaw was found in the fix for CVE-2019-11135, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.(CVE-2019-19338)
kernel: A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls.(CVE-2019-3901)
kernel: A flaw was found in the USB monitor driver of the Linux kernel. This flaw allows an attacker with physical access to the system to crash the system or potentially escalate their privileges.(CVE-2019-9456)
kernel: If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and not be processed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a WiFi dongle). This can allow firmware event frames from a remote source to be processed and this can result in denial of service (DoS) condition.(CVE-2019-9503)
kernel: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)
kernel: bugfix
zsh: A flaw was found in zsh. When unsetting the PRIVILEGED option, the shell sets its effective user and group IDs to match their respective real IDs. When the RUID and EUID were both non-zero, it is possible to regain the shell's former privileges. Also, the setopt built-in did not correctly report errors when unsetting the option, which prevented users from handling them as the documentation recommended. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2019-20044)
zsh: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F9B3.

影响组件

  • kernel
  • zsh

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["bpftool-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-debug-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-abi-whitelists-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.noarch.rpm","kernel-debug-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-debug-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-doc-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.noarch.rpm","kernel-headers-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-tools-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-tools-libs-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-tools-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","kernel-tools-libs-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","perf-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","python-perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm","python-perf-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm"],"source":"kernel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.src.rpm"},{"binary":["zsh-5.0.2-34.el7_7.2.x86_64.rpm","zsh-debuginfo-5.0.2-34.el7_7.2.x86_64.rpm","zsh-html-5.0.2-34.el7_7.2.x86_64.rpm"],"source":"zsh-5.0.2-34.el7_7.2.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["bpftool-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","perf-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-core-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-abi-whitelists-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.noarch.rpm","kernel-debug-core-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-debug-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-debug-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-debug-modules-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-doc-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.noarch.rpm","kernel-headers-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-modules-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-tools-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-tools-libs-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","python-perf-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm","python-perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm"],"source":"kernel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.src.rpm"},{"binary":["zsh-5.0.2-34.el7_7.2.x86_64.rpm","zsh-html-5.0.2-34.el7_7.2.x86_64.rpm","zsh-debuginfo-5.0.2-34.el7_7.2.x86_64.rpm"],"source":"zsh-5.0.2-34.el7_7.2.src.rpm"}]}]}
CGSL MAIN 5.05
  • kernel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.src.rpm
    • bpftool-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-debug-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-abi-whitelists-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.noarch.rpm
    • kernel-debug-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-debug-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-debuginfo-common-x86_64-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-doc-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.noarch.rpm
    • kernel-headers-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-tools-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-tools-libs-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-tools-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • kernel-tools-libs-devel-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • perf-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • python-perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
    • python-perf-3.10.0-957.27.2.el7.cgslv5_5.16.212.g2ce4410.x86_64.rpm
  • zsh-5.0.2-34.el7_7.2.src.rpm
    • zsh-5.0.2-34.el7_7.2.x86_64.rpm
    • zsh-debuginfo-5.0.2-34.el7_7.2.x86_64.rpm
    • zsh-html-5.0.2-34.el7_7.2.x86_64.rpm
CGSL CORE 5.05
  • kernel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.src.rpm
    • bpftool-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • perf-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-core-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-abi-whitelists-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.noarch.rpm
    • kernel-debug-core-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-debug-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-debug-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-debug-modules-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-doc-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.noarch.rpm
    • kernel-headers-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-modules-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-debuginfo-common-x86_64-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-tools-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-tools-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-tools-libs-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • kernel-tools-libs-devel-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • python-perf-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
    • python-perf-debuginfo-3.10.0-957.27.2.el7.cgslv5_5.16.208.g08c3da7.lite.x86_64.rpm
  • zsh-5.0.2-34.el7_7.2.src.rpm
    • zsh-5.0.2-34.el7_7.2.x86_64.rpm
    • zsh-html-5.0.2-34.el7_7.2.x86_64.rpm
    • zsh-debuginfo-5.0.2-34.el7_7.2.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108