安全公告详情

NS-SA-2026-0021

2026-03-04 16:02:58

简介

important: systemd/blktrace security update

严重级别

important

主题

An update for systemd/blktrace is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

systemd:
blktrace:


Security Fix(es):
systemd: -resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.(CVE-2017-9217)
systemd: An out-of-bounds write flaw was found in the way systemd-resolved daemon handled processing of DNS responses. A remote attacker could potentially use this flaw to crash the daemon or execute arbitrary code in the context of the daemon process.(CVE-2017-9445)
systemd: It was discovered that systemd is vulnerable to a state injection attack when deserializing the state of a service. Properties longer than LINE_MAX are not correctly parsed and an attacker may abuse this flaw in particularly configured services to inject, change, or corrupt the service state.(CVE-2018-15686)
systemd: It has been discovered that systemd-tmpfiles mishandles symbolic links present in non-terminal path components. In some configurations a local user could use this vulnerability to get access to arbitrary files when the systemd-tmpfiles command is run.(CVE-2018-6954)
systemd: A heap use-after-free vulnerability was found in systemd, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.(CVE-2020-1712)
systemd: bugfix
blktrace: (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.(CVE-2018-10689)
blktrace: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • systemd
  • blktrace

影响产品

  • CGSL MAIN 6.06 (SP)

更新包

{"fix":[{"product":"CGSL MAIN 6.06 (SP)","pkgs":[{"binary":["systemd-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-container-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-devel-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-libs-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-pam-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm","systemd-udev-239-58.0.4.zncgsl6_6.8.t1.0.x86_64.rpm"],"source":"systemd-239-58.0.4.zncgsl6_6.8.t1.0.src.rpm"},{"binary":["blktrace-1.2.0-10.zncgsl6.x86_64.rpm"],"source":"blktrace-1.2.0-10.zncgsl6.src.rpm"}]}]}

CVE

参考