安全公告详情

NS-SA-2023-0060

2023-05-25 15:48:13

简介

important: kernel/qemu security update

严重级别

important

主题

An update for kernel/qemu is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel: The python3-perf package contains a module that permits applications written in the Python programming language to use the interface to manipulate perf events.
qemu: This package provides the additional iSCSI block driver for QEMU. Install this package if you want to access iSCSI volumes.


Security Fix(es):
kernel: A flaw was found in the Linux kernel's ext4_unlink function. An attacker could corrupt memory or escalate privileges when deleting a file from a recently unmounted specially crafted ext4 filesystem, including local, USB, and iSCSI.(CVE-2019-19447)
kernel: A use-after-free flaw was found in the Linux kernel?s cgroupv2 subsystem when rebooting the system. This flaw allows a local user to crash the system or escalate their privileges. The highest threat from this vulnerability is to system availability.(CVE-2020-14356)
kernel: A flaw was found in the Linux kernel?s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-14381)
kernel: A flaw was found in the Linux kernel. The generation of the device ID from the network RNG internal state is predictable. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-16166)
kernel: A flaw was found in the Linux kernel. A local attacker, able to inject conntrack netlink configuration, could overflow a local buffer causing crashes or triggering the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-25211)
kernel: A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-29661)
kernel: A flaw out of bounds memory write in the Linux kernel HID subsystem was found in the way user attach USB or other HID device that generates incorrect data inside HID report field. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.(CVE-2021-0512)
kernel: A flaw was found in the Linux kernel?s KVM implementation, where improper handing of the VM_IO|VM_PFNMAP VMAs in KVM bypasses RO checks and leads to pages being freed while still accessible by the VMM and guest. This flaw allows users who can start and control a VM to read/write random pages of memory, resulting in local privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, and system availability.(CVE-2021-22543)
kernel: A flaw was discovered in processing setsockopt IPT_SO_SET_REPLACE (or IP6T_SO_SET_REPLACE) for 32 bit processes on 64 bit systems. This flaw will allow local user to gain privileges or cause a DoS through user name space. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.(CVE-2021-22555)
kernel: A use-after-free flaw was found in the Linux kernel's SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-23133)
kernel: A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.(CVE-2021-33033)
kernel: A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.(CVE-2021-3348)
kernel: A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.(CVE-2021-3609)
kernel: An out-of-bounds memory write flaw was found in the Linux kernel?s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-3612)
kernel: A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-3715)
kernel: A flaw was found on the Linux kernel. On the PowerPC platform, the KVM guest allows the OS users to cause host OS memory corruption via rtas_args.nargs. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-37576)
kernel: A flaw was found in the Linux kernel that allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations. The highest threat from this vulnerability is to system availability.(CVE-2021-38201)
kernel: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.(CVE-2021-4083)
kernel: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.(CVE-2021-4155)
kernel: A vulnerability was found in the Linux kernel?s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.(CVE-2022-0492)
kernel: A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.(CVE-2022-0847)
kernel: A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.(CVE-2022-27666)
kernel: bugfix
qemu: A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator. The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service.(CVE-2019-15890)
qemu: An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.(CVE-2020-14364)
qemu: An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.(CVE-2020-1711)
qemu: A flaw was found in the USB redirector device emulation of QEMU. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.(CVE-2021-3682)
qemu: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.(CVE-2021-3713)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.80CP3B3.

影响组件

  • kernel
  • qemu

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["kernel-abi-whitelists-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.noarch.rpm","kernel-ipaclones-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-doc-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.noarch.rpm","kernel-debug-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-tools-libs-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-tools-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-cross-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-sign-keys-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","bpftool-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","python3-perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debug-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-selftests-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-debuginfo-common-x86_64-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","kernel-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm","perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm"],"source":"kernel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.src.rpm"},{"binary":["qemu-debugsource-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-iscsi-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-img-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-common-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-img-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-curl-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-gluster-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-kvm-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-rbd-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-common-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-ssh-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-block-dmg-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm","qemu-tools-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm"],"source":"qemu-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.src.rpm"}]}]}
CGSL MAIN 6.02
  • kernel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.src.rpm
    • kernel-abi-whitelists-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.noarch.rpm
    • kernel-ipaclones-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-doc-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.noarch.rpm
    • kernel-debug-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-tools-libs-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-tools-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-cross-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-sign-keys-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • bpftool-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-modules-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • python3-perf-debuginfo-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-core-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debug-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-selftests-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-debuginfo-common-x86_64-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • kernel-modules-internal-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
    • perf-4.18.0-193.14.2.el8_2.cgslv6_2.419.41.g07ecc9b01.x86_64.rpm
  • qemu-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.src.rpm
    • qemu-debugsource-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-iscsi-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-img-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-common-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-img-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-curl-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-gluster-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-kvm-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-rbd-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-common-debuginfo-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-ssh-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-block-dmg-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm
    • qemu-tools-4.1.0-2.el8.cgslv6_2.209.8.g84875027d.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108