安全公告详情

NS-SA-2023-0001

2023-02-20 15:08:33

简介

important: kernel/rsync security update

严重级别

important

主题

An update for kernel/rsync is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: The python-perf package contains a module that permits applications written in the Python programming language to use the interface to manipulate perf events.
rsync: Rsync uses a reliable algorithm to bring remote and host files into sync very quickly. Rsync is fast because it just sends the differences in the files over the network instead of sending the complete files. Rsync is often used as a very powerful mirroring process or just as a more capable replacement for the rcp command. A technical report which describes the rsync algorithm is included in this package.


Security Fix(es):
kernel: A random memory access flaw was found in the Linux kernel?s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.(CVE-2022-0330)
kernel: A use-after-free flaw was found in the Linux kernel?s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.(CVE-2022-1011)
kernel: A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.(CVE-2022-1016)
kernel: An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-2639)
kernel: A use-after-free vulnerability was found in the Linux kernel's Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.(CVE-2022-32250)
kernel: A flaw was found in the Linux kernel?s IP framework for transforming packets (XFRM subsystem). An error while resolving policies in xfrm_bundle_lookup causes the refcount to drop twice, leading to a possible crash and a denial of service.(CVE-2022-36879)
kernel: drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.(CVE-2022-40768)
kernel: A use-after-free flaw was found in the Linux kernel?s dvb-core subsystem (DVB API used by Digital TV devices) in how a user physically removed a USB device (such as a DVB demultiplexer device) while running malicious code. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-41218)
kernel: bugfix
rsync: A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.(CVE-2022-29154)
rsync: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F47B5.

影响组件

  • kernel
  • rsync

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.noarch.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.noarch.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1166.ge84636c.src.rpm"},{"binary":["rsync-3.1.2-11.el7_9.x86_64.rpm","rsync-debuginfo-3.1.2-11.el7_9.x86_64.rpm"],"source":"rsync-3.1.2-11.el7_9.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-debug-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-debug-core-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-core-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.noarch.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.noarch.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1075.gfc913bc.lite.src.rpm"},{"binary":["rsync-3.1.2-11.el7_9.x86_64.rpm","rsync-debuginfo-3.1.2-11.el7_9.x86_64.rpm"],"source":"rsync-3.1.2-11.el7_9.src.rpm"}]}]}

CVE

参考