安全公告详情

NS-SA-2022-0001

2022-05-07 00:15:06

简介

important: kernel/openssh-latest security update

严重级别

important

主题

An update for kernel/openssh-latest is now available for NewStart CGSL MAIN 4.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: Kernel-headers includes the C header files that specify the interface between the Linux kernel and userspace libraries and programs. The header files define structures and constants that are needed for building most standard programs and are also needed for rebuilding the glibc package.
openssh-latest: This package provides debug information for package openssh-latest. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
kernel: A vulnerability was found in the Key Management sub component of the Linux kernel, where when trying to issue a KEYTCL_READ on a negative key would lead to a NULL pointer dereference. A local attacker could use this flaw to crash the kernel.(CVE-2017-12192)
kernel: A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type->match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges.(CVE-2017-2647)
kernel: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.(CVE-2020-10711)
kernel: bugfix
openssh-latest: A flaw was found in OpenSSH. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user. Depending on system configuration, inherited groups may allow AuthorizedKeysCommand/AuthorizedPrincipalsCommand helper programs to gain unintended privileges, potentially leading to local privilege escalation.(CVE-2021-41617)
openssh-latest: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 4.05.F19CP1B1.

影响组件

  • kernel
  • openssh-latest

影响产品

  • CGSL MAIN 4.05

更新包

{"fix":[{"product":"CGSL MAIN 4.05","pkgs":[{"binary":["python-perf-debuginfo-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","kernel-debuginfo-common-x86_64-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","kernel-headers-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","python-perf-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","kernel-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","perf-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","kernel-debuginfo-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","kernel-devel-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm","perf-debuginfo-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.x86_64.rpm"],"source":"kernel-2.6.32-642.13.1.el6.cgslv4_5.0.161.gc808dd6.src.rpm"},{"binary":["openssh-latest-debuginfo-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm","openssh-latest-clients-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm","openssh-latest-askpass-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm","openssh-latest-keycat-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm","openssh-latest-server-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm","openssh-latest-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.x86_64.rpm"],"source":"openssh-latest-8.5p1-2.el6.cgslv4_6.0.7.g0b22f39.src.rpm"}]}]}

CVE

参考