安全公告详情

NS-SA-2026-0017

2026-03-04 16:02:55

简介

low: tk/linux-firmware security update

严重级别

low

主题

An update for tk/linux-firmware is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

tk:
linux-firmware:


Security Fix(es):
tk: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5137. Reason: This candidate is a duplicate of CVE-2007-5137. Notes: All CVE users should reference CVE-2007-5137 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage(CVE-2007-4851)
tk: bugfix
linux-firmware: The Broadcom Wi-Fi driver in the kernel in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49G, and 6.x before 2016-02-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets, aka internal bug 25662029.(CVE-2016-0801)
linux-firmware: A remote code execution vulnerability in the Broadcom Wi-Fi firmware could enable a remote attacker to execute arbitrary code within the context of the Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote code execution in the context of the Wi-Fi SoC. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199105. References: B-RB#110814(CVE-2017-0561)
linux-firmware: Broadcom BCM43xx Wi-Fi chips allow remote attackers to execute arbitrary code via unspecified vectors, aka the Broadpwn issue(CVE-2017-9417)
linux-firmware: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • tk
  • linux-firmware

影响产品

  • CGSL MAIN 6.06 (SP)

更新包

{"fix":[{"product":"CGSL MAIN 6.06 (SP)","pkgs":[{"binary":["tk-8.6.8-1.zncgsl6.x86_64.rpm"],"source":"tk-8.6.8-1.zncgsl6.src.rpm"},{"binary":["iwl1000-firmware-39.31.5.1-108.zncgsl6_6.1.noarch.rpm","iwl100-firmware-39.31.5.1-108.zncgsl6_6.1.noarch.rpm","iwl105-firmware-18.168.6.1-108.zncgsl6_6.1.noarch.rpm","iwl135-firmware-18.168.6.1-108.zncgsl6_6.1.noarch.rpm","iwl2000-firmware-18.168.6.1-108.zncgsl6_6.1.noarch.rpm","iwl2030-firmware-18.168.6.1-108.zncgsl6_6.1.noarch.rpm","iwl3160-firmware-25.30.13.0-108.zncgsl6_6.1.noarch.rpm","iwl5000-firmware-8.83.5.1_1-108.zncgsl6_6.1.noarch.rpm","iwl5150-firmware-8.24.2.2-108.zncgsl6_6.1.noarch.rpm","iwl6000g2a-firmware-18.168.6.1-108.zncgsl6_6.1.noarch.rpm","iwl6000-firmware-9.221.4.1-108.zncgsl6_6.1.noarch.rpm","iwl6050-firmware-41.28.5.1-108.zncgsl6_6.1.noarch.rpm","iwl7260-firmware-25.30.13.0-108.zncgsl6_6.1.noarch.rpm","linux-firmware-20220210-108.git6342082c.zncgsl6_6.noarch.rpm"],"source":"linux-firmware-20220210-108.git6342082c.zncgsl6_6.src.rpm"}]}]}

CVE

参考