安全公告详情

NS-SA-2021-0012

2021-03-09 13:00:11

简介

important: dovecot/kernel security update

严重级别

important

主题

An update for dovecot/kernel is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

dovecot: This package provides the Postgres SQL back end for dovecot-auth etc.
kernel: This package provides kernel headers and makefiles sufficient to build modules against the kernel package.


Security Fix(es):
dovecot: A flaw was found in dovecot. A remote attacker could cause a denial of service by repeatedly sending emails containing MIME parts containing malicious content of which dovecot will attempt to parse. The highest threat from this vulnerability is to system availability.(CVE-2020-12100)
dovecot: A flaw was found in dovecot. An out-of-bounds read flaw was found in the way dovecot handled NTLM authentication allowing an attacker to crash the dovecot auth process repeatedly preventing login. The highest threat from this vulnerability is to system availability.(CVE-2020-12673)
dovecot: A flaw was found in dovecot. An attacker can use the way dovecot handles RPA (Remote Passphrase Authentication) to crash the authentication process repeatedly preventing login. The highest threat from this vulnerability is to system availability.(CVE-2020-12674)
dovecot: bugfix
kernel: A flaw was found in the NFSv4 implementation where when mounting a remote attacker controlled server it could return specially crafted response allow for local memory corruption and possibly privilege escalation.(CVE-2020-25212)
kernel: A flaw was found in the capabilities check of the rados block device functionality in the Linux kernel. Incorrect capability checks could alllow a local user with root priviledges (but no capabilities) to add or remove Rados Block Devices from the system.(CVE-2020-25284)
kernel: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F28B5.

影响组件

  • dovecot
  • kernel

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["dovecot-pgsql-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-mysql-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-devel-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-pigeonhole-2.2.36-6.el7_8.1.x86_64.rpm"],"source":"dovecot-2.2.36-6.el7_8.1.src.rpm"},{"binary":["python-perf-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.51.912.gf6a1413.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["dovecot-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-debuginfo-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-devel-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-pgsql-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-mysql-2.2.36-6.el7_8.1.x86_64.rpm","dovecot-pigeonhole-2.2.36-6.el7_8.1.x86_64.rpm"],"source":"dovecot-2.2.36-6.el7_8.1.src.rpm"},{"binary":["kernel-core-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.noarch.rpm","kernel-debug-core-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-debug-modules-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.noarch.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-modules-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.52.871.g8c342d3.lite.src.rpm"}]}]}

CVE

参考