安全公告详情

NS-SA-2023-0059

2023-05-25 15:16:31

简介

important: kernel security update

严重级别

important

主题

An update for kernel is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: The python3-perf package contains a module that permits applications written in the Python programming language to use the interface to manipulate perf events.


Security Fix(es):
kernel: A use-after-free flaw was found in slcan_write_wakeup in drivers/net/can/slcan.c in the serial CAN module slcan. A race condition occurs when communicating with can using slcan between the write (scheduling the transmit) and closing (flushing out any pending queues) the SLCAN channel. This flaw allows a local attacker with special user or root privileges to cause a denial of service or a kernel information leak. The highest threat from this vulnerability is to system availability.(CVE-2020-14416)
kernel: A random memory access flaw was found in the Linux kernel?s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.(CVE-2022-0330)
kernel: A stack overflow flaw was found in the Linux kernel?s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.(CVE-2022-0435)
kernel: An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-2639)
kernel: A memory leak flaw was found in bnx2x_tpa_stop in drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c in the bnx2x sub-component in the Linux Kernel. This flaw may allow a local attacker to cause a denial of service.(CVE-2022-3542)
kernel: A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.(CVE-2022-3545)
kernel: A flaw was found in the Linux kernel’s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to to disclose sensitive information or crash the system, causing a denial of service.(CVE-2022-3586)
kernel: A vulnerability was found in intr_callback in drivers/net/usb/r8152.c in the BPF component in the Linux Kernel. The manipulation leads to logging excessive data, where an attack can be launched remotely.(CVE-2022-3594)
kernel: An information disclosure vulnerability is found in stex_queuecommand_lck() in drivers/scsi/stex.c in the Linux Kernel. This flaw allows a local attacker to disclose sensitive information such as kernel space address.(CVE-2022-40768)
kernel: A use-after-free flaw was found in the Linux kernel’s dvb-core subsystem (DVB API used by Digital TV devices) in how a user physically removed a USB device (such as a DVB demultiplexer device) while running malicious code. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-41218)
kernel: An out-of-bounds memory write flaw in the Linux kernel’s USB Monitor component was found in how a user with access to the /dev/usbmon can trigger it by an incorrect write to the memory of the usbmon. This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-43750)
kernel: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.B0CP3B6.

影响组件

  • kernel

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["kernel-ipaclones-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-debug-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-debug-modules-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-sign-keys-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-debug-core-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-debug-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-debug-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-selftests-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-abi-whitelists-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.noarch.rpm","kernel-doc-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.noarch.rpm","kernel-debug-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-tools-libs-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-cross-headers-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","perf-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm","kernel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm"],"source":"kernel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.src.rpm"}]}]}
CGSL MAIN 6.02
  • kernel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.src.rpm
    • kernel-ipaclones-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-debug-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-debug-modules-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-sign-keys-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-debug-core-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-debug-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-debug-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-selftests-internal-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-abi-whitelists-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.noarch.rpm
    • kernel-doc-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.noarch.rpm
    • kernel-debug-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-tools-libs-devel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-cross-headers-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • perf-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm
    • kernel-4.18.0-193.14.2.el8_2.cgslv6_2.528.24.gdfbf1535f.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108