安全公告详情

NS-SA-2024-0014

2024-04-12 10:52:29

简介

important: kernel/python-requests security update

严重级别

important

主题

An update for kernel/python-requests is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel:
python-requests:


Security Fix(es):
kernel: A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges.(CVE-2021-3609)
kernel: A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the "access_ok" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.(CVE-2023-0459)
kernel: An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.(CVE-2023-2124)
kernel: bugfix
python-requests: A credentials-exposure flaw was found in python-requests, where if a request with authentication is redirected (302) from an HTTPS endpoint to an HTTP endpoint on the same host, the Authorization header is not stripped and the credentials can be read in plain text. A man-in-the-middle attacker could exploit this flaw to obtain a user's valid credentials.(CVE-2018-18074)
python-requests: A flaw was found in the Python-requests package, where it is vulnerable to potentially leaking Proxy-Authorization headers to destination servers, specifically during redirects to an HTTPS origin. This is a product of how rebuild_proxies is used to recompute and reattach the Proxy-Authorization header to requests when redirected. This behavior only affects proxied requests when credentials are supplied in the URL user information component (for example, https://username:password@proxy:8080).(CVE-2023-32681)
python-requests: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F54B2.

影响组件

  • kernel
  • python-requests

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-debug-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.noarch.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.noarch.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.55.1300.g05640c3.src.rpm"},{"binary":["python-requests-2.6.0-5.el7.cgslv5_4.0.1.g78de59b.noarch.rpm"],"source":"python-requests-2.6.0-5.el7.cgslv5_4.0.1.g78de59b.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["kernel-sign-keys-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-tools-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","python-perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","perf-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-tools-libs-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-debug-devel-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-debug-core-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-tools-libs-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-doc-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.noarch.rpm","kernel-abi-whitelists-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.noarch.rpm","kernel-debug-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-headers-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-tools-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-debuginfo-common-x86_64-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-core-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-debug-modules-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","kernel-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","perf-debuginfo-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm","python-perf-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.x86_64.rpm"],"source":"kernel-3.10.0-693.21.1.el7.cgslv5_4.57.1153.g894907d.lite.src.rpm"},{"binary":["python-requests-2.6.0-5.el7.cgslv5_4.0.1.g78de59b.noarch.rpm"],"source":"python-requests-2.6.0-5.el7.cgslv5_4.0.1.g78de59b.src.rpm"}]}]}

CVE

参考