安全公告详情

NS-SA-2025-0253

2025-10-23 19:59:52

简介

important: kernel/python-setuptools security update

严重级别

important

主题

An update for kernel/python-setuptools is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

kernel:
python-setuptools:


Security Fix(es):
kernel:In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() nvme_tcp_recv_pdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest. Fix this by rejecting packets with an unexpected header length.(CVE-2025-21927)
kernel: A use-after-free flaw was found in the Linux kernel's network route management. This flaw allows an attacker to alter the behavior of certain network connections.(CVE-2024-36971)
kernel: In the Linux kernel, the following vulnerability has been resolved: ila: serialize calls to nf_register_net_hooks() syzbot found a race in ila_add_mapping() [1] commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner") attempted to fix a similar issue. Looking at the syzbot repro, we have concurrent ILA_CMD_ADD commands. Add a mutex to make sure at most one thread is calling nf_register_net_hooks(). [1] BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline] BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604 Read of size 4 at addr ffff888028f40008 by task dhcpcd/5501 CPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xc3/0x620 mm/kasan/report.c:489 kasan_report+0xd9/0x110 mm/kasan/report.c:602 rht_key_hashfn include/linux/rhashtable.h:159 [inline] __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604 rhashtable_lookup include/linux/rhashtable.h:646 [inline] rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline] ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline] ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline] ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626 nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269 NF_HOOK include/linux/netfilter.h:312 [inline] ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309 __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672 __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785 process_backlog+0x443/0x15f0 net/core/dev.c:6117 __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0xa94/0x1010 net/core/dev.c:7074 handle_softirqs+0x213/0x8f0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1(CVE-2024-57900)
kernel: In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occurs. So we should add missing range checks and remove unnecessary range checks.(CVE-2024-53141)
kernel: In the Linux kernel, the following vulnerability has been resolved: rapidio: fix an API misues when rio_add_net() fails rio_add_net() calls device_register() and fails when device_register() fails. Thus, put_device() should be used rather than kfree(). Add "mport->net = NULL;" to avoid a use after free issue.(CVE-2025-21934)
kernel: A vulnerability was found in the Linux kernel's USB Audio driver. This flaw allows an attacker with physical access to the system to use a malicious USB device to gain additional access. This is possible by manipulating system memory, potentially escalating privileges, or executing arbitrary code.(CVE-2024-53197)
kernel: An out-of-bounds buffer overflow has been found in the Linux kernel’s mac80211 subsystem when scanning for SSIDs. Address calculation using out-of-bounds array indexing could result in an attacker crafting an exploit, resulting in the complete compromise of a system.(CVE-2024-41071)
kernel: A divide by zero flaw was found in the Linux kernel's Multipath TCP (MPTCP). This issue could allow a remote user to crash the system.(CVE-2024-53122)
kernel: bugfix
python-setuptools: A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn't expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.(CVE-2025-47273)
python-setuptools: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.04B7.

影响组件

  • kernel
  • python-setuptools

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["system-enhance-cgslv7.25-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-modules-internal-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-modules-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-modules-internal-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-modules-internal-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-modules-extra-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-modules-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-modules-extra-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-headers-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-modules-extra-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-modules-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-devel-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-devel-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-devel-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-core-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-kasan-core-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","kernel-debug-core-6.6.25-2.1.zncgsl7.1748.x86_64.rpm","Zeal-kernel-tools-6.6.25-2.1.zncgsl7.1748.x86_64.rpm"],"source":"kernel-6.6.25-2.1.zncgsl7.1748.src.rpm"},{"binary":["python3-setuptools-doc-68.0.0-2.zncgsl7.6.noarch.rpm","python3-setuptools-68.0.0-2.zncgsl7.6.noarch.rpm","python-setuptools-wheel-68.0.0-2.zncgsl7.6.noarch.rpm"],"source":"python-setuptools-68.0.0-2.zncgsl7.6.src.rpm"}]}]}

CVE

参考