安全公告详情

NS-SA-2024-0033

2024-07-01 19:14:58

简介

important: kernel/python3 security update

严重级别

important

主题

An update for kernel/python3 is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel:
python3:


Security Fix(es):
kernel: A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.(CVE-2021-0129)
kernel: A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.(CVE-2021-4028)
kernel: A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.(CVE-2021-4037)
kernel: A use-after-free flaw was found in the Linux kernel’s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.(CVE-2022-1729)
kernel: An incorrect TLB flush issue was found in the Linux kernel’s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.(CVE-2022-4139)
kernel: A possible race condition was found in drivers/char/pcmcia/cm4000_cs.c between the cmm_open() and the cm4000_detach() functions if the user physically removes the PCMCIA device in the Linux kernel. This flaw may eventually result in a use-after-free (UAF) flaw.(CVE-2022-44032)
kernel: A use-after-free flaw was found in the Linux Kernel. This issue occurs due to a race between cm4040_open() and reader_detach() in drivers/char/pcmcia/cm4040_cs.c when a physically proximate attacker removes a PCMCIA device while calling open().(CVE-2022-44033)
kernel: An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().(CVE-2022-44034)
kernel: A use-after-free flaw was found in snd_ctl_elem_read in sound/core/control.c in Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel. In this flaw a normal privileged, local attacker may impact the system due to a locking issue in the compat path, leading to a kernel information leak problem.(CVE-2023-0266)
kernel: A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.(CVE-2023-0386)
kernel: A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.(CVE-2023-0394)
kernel: A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.(CVE-2023-0590)
kernel: A use-after-free flaw was found in asus_kbd_backlight_set in drivers/hid/hid-asus.c in the Linux Kernel. This issue could allow an attacker to crash the system when plugging in or disconnecting a malicious USB device, which may lead to a kernel information leak problem.(CVE-2023-1079)
kernel: A NULL pointer dereference flaw was found in the Linux kernel’s netfilter subsystem. The issue could occur due to an error in nf_tables_updtable while freeing a transaction object not placed on the list head. This flaw allows a local, unprivileged user to crash the system, resulting in a denial of service.(CVE-2023-1095)
kernel: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The imperfect hash area can be updated while packets are traversing. This issue could allow a local attacker to cause a use-after-free problem, leading to privilege escalation.(CVE-2023-1281)
kernel: A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.(CVE-2023-1390)
kernel: A use-after-free vulnerability was found in the traffic control index filter (tcindex) in the Linux kernel. The tcindex_delete does not properly deactivate filters, which can later lead to double freeing the structure. This flaw allows a local attacker to cause a use-after-free problem, leading to privilege escalation.(CVE-2023-1829)
kernel: A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in the virtio network subcomponent in the Linux kernel due to a double fget. This issue could allow a local attacker to crash the system, and could lead to a kernel information leak problem.(CVE-2023-1838)
kernel: A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.(CVE-2023-1855)
kernel: A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. A call to btsdio_remove with an unfinished job may cause a race problem which leads to a UAF on hdev devices.(CVE-2023-1989)
kernel: A use-after-free flaw was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in the SCSI sub-component in the Linux Kernel. This issue could allow an attacker to leak kernel internal information.(CVE-2023-2162)
kernel: A NULL pointer dereference issue was found in the SCTP network protocol in net/sctp/stream_sched.c in the Linux kernel. If stream_in allocation fails, stream_out is freed, which would be accessed further. This flaw allows a local user to crash the system or potentially cause a denial of service.(CVE-2023-2177)
kernel: An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not limited to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This issue could allow a local privileged user to crash the system or potentially achieve code execution.(CVE-2023-2194)
kernel: A NULL pointer dereference flaw was found in the Linux kernel’s Mellanox Technologies software-managed steering driver. This flaw allows a local user to crash the system.(CVE-2023-23006)
kernel: A race condition leading to a use-after-free vulnerability was found in the Linux kernel's Sun Virtual Console Concentrator (VCC). This issue can result in a system crash or potential code execution if a physically proximate attacker removes a VCC device while calling open().(CVE-2023-23039)
kernel: A use-after-free flaw was found in the Linux kernel. This issue may be triggered in the bigben_set_led() function when plugging in a malicious USB device that advertises itself as a bigben device. This flaw allows a local user with physical access to cause a denial of service.(CVE-2023-25012)
kernel: A NULL pointer dereference flaw was found in the az6027 driver in drivers/media/usb/dev-usb/az6027.c in the Linux Kernel. The message from user space is not checked properly before transferring into the device. This flaw allows a local user to crash the system or potentially cause a denial of service.(CVE-2023-28328)
kernel: A use-after-free flaw was found in the do_tls_getsockopt function in net/tls/tls_main.c in the Transport Layer Security (TLS) in the Network subcompact in the Linux kernel. This flaw allows an attacker to cause a NULL pointer dereference problem due to a race condition.(CVE-2023-28466)
kernel: A buffer overflow write flaw was identified in seq_buf_putmem_hex in lib/seq_buf.c in seq_buf in the Linux Kernel. This issue may allow a user with special debug privileges such as ftrace or root to cause an overflow in the destination buffer due to a missing sanity check.(CVE-2023-28772)
kernel: A flaw was found in the KVM's Intel nested virtualization feature (nVMX). The effective values of the guest CR0 and CR4 registers could differ from those included in the VMCS12. In rare circumstances (i.e., kvm_intel module loaded with parameters nested=1 and ept=0) this could allow a malicious guest to crash the host system, causing a denial of service.(CVE-2023-30456)
kernel: A race condition was found in the Linux kernel's DA9150 charger when removing the module before cleanup in the da9150_charger_remove function. This can result in a use-after-free issue, possibly leading to a system crash or other undefined behaviors.(CVE-2023-30772)
kernel: bugfix
python3: A vulnerability was discovered in Python. A quadratic algorithm exists when processing inputs to the IDNA (RFC 3490) decoder, such that a crafted unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor, which could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied hostname.(CVE-2022-45061)
python3: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.(CVE-2023-24329)
python3: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.F0B9.

影响组件

  • kernel
  • python3

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["bpftool-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-core-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-devel-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-headers-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-modules-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-modules-extra-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-tools-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","kernel-tools-libs-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","perf-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm","python3-perf-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.x86_64.rpm"],"source":"kernel-4.18.0-193.14.2.el8_2.cgslv6_2.726.g402ed2fc3.src.rpm"},{"binary":["platform-python-3.6.8-47.el8.cgslv6_2.4.g56623be.x86_64.rpm","platform-python-devel-3.6.8-47.el8.cgslv6_2.4.g56623be.x86_64.rpm","python3-devel-3.6.8-47.el8.cgslv6_2.4.g56623be.x86_64.rpm","python3-libs-3.6.8-47.el8.cgslv6_2.4.g56623be.x86_64.rpm","python3-tkinter-3.6.8-47.el8.cgslv6_2.4.g56623be.x86_64.rpm"],"source":"python3-3.6.8-47.el8.cgslv6_2.4.g56623be.src.rpm"}]}]}

CVE

参考