NS-SA-2022-0014
2022-05-08 18:04:43
简介
important: kernel/libsndfile security update
严重级别
important
主题
An update for kernel/libsndfile is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
详细描述
kernel: This package contains the development files for the tools/ directory from the kernel source.
libsndfile: libsndfile is a C library for reading and writing sound files such as AIFF, AU, WAV, and others through one standard interface. It can currently read/write 8, 16, 24 and 32-bit PCM files as well as 32 and 64-bit floating point WAV files and a number of compressed formats. It compiles and runs on *nix, MacOS, and Win32.
Security Fix(es):
kernel: A flaw was found in the Linux kernel’s implementation of displaying NUMA statistics, where displaying the scheduler statistics could trigger a use-after-free in show_numa_stats() and display the kernel memory to userspace. The highest threat from this vulnerability is to system availability.(CVE-2019-20934)
kernel: A NULL pointer dereference flaw was found in the Xirlink camera USB driver 'xirlink-cit' in the Linux kernel. The driver mishandles invalid descriptors leading to a denial-of-service (DoS). This could allow a local attacker with user privilege to crash the system or leak kernel internal information.(CVE-2020-11668)
kernel: A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.(CVE-2021-33033)
kernel: A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.(CVE-2021-33034)
kernel: bugfix
libsndfile: An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service.(CVE-2018-19662)
libsndfile: A heap buffer overflow flaw was found in libsndfile. This flaw allows an attacker to execute arbitrary code via a crafted WAV file. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-3246)
libsndfile: bugfix
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F37B4.
影响组件
影响产品
- CGSL MAIN 5.04
- CGSL CORE 5.04
更新包
{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.noarch.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.noarch.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1086.gd8e7f98.src.rpm"},{"binary":["libsndfile-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm"],"source":"libsndfile-1.0.25-12.el7_9.1.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-debug-core-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-debug-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.noarch.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.noarch.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-core-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1012.ga0f80e7.lite.src.rpm"},{"binary":["libsndfile-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm","libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm"],"source":"libsndfile-1.0.25-12.el7_9.1.src.rpm"}]}]}
CVE
参考