安全公告详情

NS-SA-2023-0103

2023-07-13 18:35:27

简介

important: gzip/kernel security update

严重级别

important

主题

An update for gzip/kernel is now available for NewStart CGSL MAIN 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

gzip: The gzip package contains the popular GNU gzip data compression program. Gzipped files have a .gz extension. Gzip should be installed on your system, because it is a very commonly used data compression program.
kernel: This package provides kernel headers and makefiles sufficient to build modules against the debug kernel package.


Security Fix(es):
gzip: An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.(CVE-2022-1271)
gzip: bugfix
kernel: A use-after-free flaw was found in the Linux kernel’s ISDN over IP tunnel functionality in how a local user triggers the release_card() function called from l1oip_cleanup(). This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2022-3565)
kernel: A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.(CVE-2022-41858)
kernel: A race condition flaw leading to a use-after-free issue was found in the Linux kernel media subsystem in the DVB core device driver. It could occur in the dvb_register_device() function due to the file_operations structure (fops) being dynamically allocated and later kfreed. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.(CVE-2022-45884)
kernel: A race condition flaw leading to a use-after-free issue was found in the Linux kernel media subsystem in the DVB core device driver. It could occur in the dvb_frontend() function when closing the device node of dvb_frontend if the device is disconnected. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.(CVE-2022-45885)
kernel: A race condition flaw leading to a use-after-free issue was found in the Linux kernel media subsystem in the dvb_net component of the DVB core device driver. It could occur between the time the device is disconnected (.disconnect function) and the time the device node is opened (dvb_device_open function). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.(CVE-2022-45886)
kernel: A memory leak issue was found in the Linux kernel media subsystem in the TTUSB DEC driver. It could occur in the ttusb_dec_exit_dvb() function because of the lack of a dvb_frontend_detach call. A local user could trigger this flaw by repeatedly plugging and unplugging the device, potentially causing a denial of service condition.(CVE-2022-45887)
kernel: A race condition flaw leading to a use-after-free issue was found in the Linux kernel media subsystem in the DVB CA EN50221 interface of the DVB core device driver. It could occur in the dvb_ca_en50221_release() function if there is a disconnect after an open, because of the lack of a wait_event. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.(CVE-2022-45919)
kernel: An integer overflow flaw was found in the Linux kernel’s L2CAP bluetooth functionality in how a user generates malicious L2CAP_CONF_REQ packets. This flaw allows a local or bluetooth connection user to crash the system.(CVE-2022-45934)
kernel: An incorrect access control flaw was found in the Linux kernel USB core subsystem. When attaching a malicious usb device, the recursive locking violation in usb-storage can cause the kernel to deadlock. This issue could allow a local user to crash the system.(CVE-2022-4662)
kernel: A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.(CVE-2023-0394)
kernel: An out-of-bounds (OOB) read problem was found in cbq_classify in net/sched/sch_cbq.c in the Linux kernel. This issue may allow a local attacker to cause a denial of service due to type confusion. Non-negative numbers could indicate a TC_ACT_SHOT condition rather than valid classification results.(CVE-2023-23454)
kernel: A denial of service flaw was found in atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel. This issue may allow a local attacker to cause a denial of service due to type confusion. Non-negative numbers could indicate a TC_ACT_SHOT condition rather than valid classification results.(CVE-2023-23455)
kernel: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F50B4.

影响组件

  • gzip
  • kernel

影响产品

  • CGSL MAIN 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["gzip-1.5-11.el7_9.x86_64.rpm","gzip-debuginfo-1.5-11.el7_9.x86_64.rpm"],"source":"gzip-1.5-11.el7_9.src.rpm"},{"binary":["kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.noarch.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.noarch.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1262.g5a6c2df.src.rpm"}]}]}

CVE

参考