安全公告详情

NS-SA-2021-0095

2021-09-24 00:10:31

简介

important: glibc/xstream security update

严重级别

important

主题

An update for glibc/xstream is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

glibc: The glibc-utils package contains memusage, a memory usage profiler, mtrace, a memory leak tracer and xtrace, a function call tracer which can be helpful during program debugging. If unsure if you need this, don't install this package.
xstream: XStream is a simple library to serialize objects to XML and back again. A high level facade is supplied that simplifies common use cases. Custom objects can be serialized without need for specifying mappings. Speed and low memory footprint are a crucial part of the design, making it suitable for large object graphs or systems with high message throughput. No information is duplicated that can be obtained via reflection. This results in XML that is easier to read for humans and more compact than native Java serialization. XStream serializes internal fields, including private and final. Supports non-public and inner classes. Classes are not required to have default constructor. Duplicate references encountered in the object-model will be maintained. Supports circular references. By implementing an interface, XStream can serialize directly to/from any tree structure (not just XML). Strategies can be registered allowing customization of how particular types are represented as XML. When an exception occurs due to malformed XML, detailed diagnostics are provided to help isolate and fix the problem.


Security Fix(es):
glibc: A vulnerability was discovered in glibc where the LD_PREFER_MAP_32BIT_EXEC environment variable is not ignored when running binaries with the setuid flag on x86_64 architectures. This allows an attacker to force system to utilize only half of the memory (making the system think the software is 32-bit only), thus lowering the amount of memory being used with address space layout randomization (ASLR). The highest threat is confidentiality although the complexity of attack is high. The affected application must already have other vulnerabilities for this flaw to be usable.(CVE-2019-19126)
glibc: A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.(CVE-2020-10029)
glibc: A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability.(CVE-2019-25013)
glibc: A stack buffer overflow flaw was found in glibc in the way the printf family of functions processed an 80-bit long double with a non-canonical bit pattern. This flaw allows an attacker who can control the arguments of these functions with the non-standard long double pattern to trigger an overflow and cause an application crash. The highest threat from this vulnerability is to system availability.(CVE-2020-29573)
glibc: The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.(CVE-2014-4043)
glibc: In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.(CVE-2018-20796)
glibc: bugfix
xstream: A flaw was found in xstream. An unsafe deserialization of user-supplied XML, in conjunction with relying on the default deny list, allows a remote attacker to perform a variety of attacks including a remote code execution of arbitrary code in the context of the JVM running the XStream application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-26217)
xstream: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F31B4.

影响组件

  • glibc
  • xstream

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["glibc-devel-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-static-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-debuginfo-common-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","nscd-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-headers-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-common-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-utils-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm","glibc-debuginfo-2.17-322.el7_9.cgslv5.0.3.g1df5775.x86_64.rpm"],"source":"glibc-2.17-322.el7_9.cgslv5.0.3.g1df5775.src.rpm"},{"binary":["xstream-javadoc-1.3.1-12.el7_9.noarch.rpm","xstream-1.3.1-12.el7_9.noarch.rpm"],"source":"xstream-1.3.1-12.el7_9.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["glibc-iconv-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-debuginfo-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-devel-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-debuginfo-common-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-locale-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-headers-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-i18n-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-tools-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-lang-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","nscd-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-utils-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-common-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm","glibc-static-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.x86_64.rpm"],"source":"glibc-2.17-322.el7_9.cgslv5.0.8.ge7da949.lite.src.rpm"},{"binary":["xstream-javadoc-1.3.1-12.el7_9.noarch.rpm","xstream-1.3.1-12.el7_9.noarch.rpm"],"source":"xstream-1.3.1-12.el7_9.src.rpm"}]}]}

CVE

参考