RHEL 8:kernel-rt (RHSA-2022: 1975)

critical Nessus 插件 ID 161034

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的多个程序包受到 RHSA-2022: 1975 公告。

- 内核:避免因不规范 USB 描述符而导致的循环实体链 (CVE-2020-0404)

- 内核:drivers/tty/vt/keyboard.c 中 k_ascii() 的整数溢出 (CVE-2020-13974)

- 内核:nouveau 内核模块中存在释放后使用 (CVE-2020-27820)

- 内核:由于释放后使用,filter.c 的 bpf_skb_change_head() 中发生越界读取 (CVE-2021-0941)

- 内核:基于所需数据包回复的 ICMP 片段的新 DNS 缓存中毒攻击 (CVE-2021-20322)

- hw:cpu:针对 CVE-2017-5715 的 LFENCE/JMP 缓解措施更新 (CVE-2021-26401)

- 内核:由于不正确的 BPF JIT 分支置换计算导致本地特权升级 (CVE-2021-29154)

- 内核:joydev:传递给 joydev_handle_JSIOCSBTNMAP() 的零大小 (CVE-2021-3612)

- 内核:读取 /proc/sysvipc/shm 不会随着大型共享内存段计数进行缩放 (CVE-2021-3669)

- 内核:drivers/net/usb/hso.c 的 hso_free_net_device() 中存在释放后使用 (CVE-2021-37159)

- 内核:net/qrtr/qrtr.c 的 qrtr_endpoint_post 中存在越界读取 (CVE-2021-3743)

- 内核:crypto:- ccp - 修复了 ccp_run_aes_gcm_cmd() 中的资源泄漏问题 (CVE-2021-3744)

- 内核:蓝牙模块中可能存在释放后使用漏洞 (CVE-2021-3752)

- 内核:Linux 内核中下落不明的 ipc 对象导致破坏 memcg 限制和 DoS 攻击 (CVE-2021-3759)

- 内核:ccp_run_aes_gcm_cmd() 函数中的 DoS (CVE-2021-3764)

- 内核:sctp:无效的区块可用于远程删除现有关联 (CVE-2021-3772)

- 内核:natd 和 netfilter 中缺少端口健全性检查,导致利用 OpenVPN 客户端 (CVE-2021-3773)

- 内核:驻留于 hugetlbfs 的数据可能泄漏或损坏 (CVE-2021-4002)

- 内核:针对 CVE-2018-13405 的安全回归 (CVE-2021-4037)

- 内核:获得对 fget: 的引用后,检查它是否仍然存在 (CVE-2021-4083)

- 内核:decode_nfs_fh 函数中的缓冲区改写 (CVE-2021-4157)

- 内核:kernel/bpf/stackmap.c 中 prealloc_elms_and_freelist() 中的 eBPF 乘法整数溢出导致越界写入 (CVE-2021-41864)

- 内核:cgroup:使用开放时间凭据和命名空间进行迁移 perm 检查 (CVE-2021-4197)

- 内核:sk_peer_pid 和 sk_peer_cred 访问中的争用条件 (CVE-2021-4203)

- 内核:firedtv 驱动程序中存在堆缓冲区溢出漏洞 (CVE-2021-42739)

- 内核:在 drivers/isdn/capi/kcapi.c 的 detach_capi_ctr 中存在一个 array-index-out-bounds (CVE-2021-43389)

- 内核:drivers/net/wireless/marvell/mwifiex/usb.c 中的 mwifiex_usb_recv() 允许攻击者通过特制的 USB 设备造成 DoS (CVE-2021-43976)

- 内核:TEE 子系统中存在释放后使用 (CVE-2021-44733)

- 内核:IPv6 实现中的信息泄漏 (CVE-2021-45485)

- 内核:IPv4 实现中的信息泄漏 (CVE-2021-45486)

- hw:cpu:intel:分支历史记录注入 (BHI) (CVE-2022-0001)

- hw:cpu:intel:帧内模式 BTI (CVE-2022-0002)

- 内核:bond_ipsec_add_sa 中的本地拒绝服务 (CVE-2022-0286)

- 内核:net/sctp/sm_make_chunk.c 中 sctp_addto_chunk 的 DoS (CVE-2022-0322)

- 内核:FUSE 允许 UAF 读取 write() 缓冲区,从而允许窃取(部分)/etc/shadow 哈希 (CVE-2022-1011)

请注意,Nessus 尚未测试这些问题,而是只依靠应用程序自我报告的版本号来判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/cve/CVE-2020-0404

https://access.redhat.com/security/cve/CVE-2020-13974

https://access.redhat.com/security/cve/CVE-2020-27820

https://access.redhat.com/security/cve/CVE-2021-0941

https://access.redhat.com/security/cve/CVE-2021-3612

https://access.redhat.com/security/cve/CVE-2021-3669

https://access.redhat.com/security/cve/CVE-2021-3743

https://access.redhat.com/security/cve/CVE-2021-3744

https://access.redhat.com/security/cve/CVE-2021-3752

https://access.redhat.com/security/cve/CVE-2021-3759

https://access.redhat.com/security/cve/CVE-2021-3764

https://access.redhat.com/security/cve/CVE-2021-3772

https://access.redhat.com/security/cve/CVE-2021-3773

https://access.redhat.com/security/cve/CVE-2021-4002

https://access.redhat.com/security/cve/CVE-2021-4037

https://access.redhat.com/security/cve/CVE-2021-4083

https://access.redhat.com/security/cve/CVE-2021-4157

https://access.redhat.com/security/cve/CVE-2021-4197

https://access.redhat.com/security/cve/CVE-2021-4203

https://access.redhat.com/security/cve/CVE-2021-20322

https://access.redhat.com/security/cve/CVE-2021-26401

https://access.redhat.com/security/cve/CVE-2021-29154

https://access.redhat.com/security/cve/CVE-2021-37159

https://access.redhat.com/security/cve/CVE-2021-41864

https://access.redhat.com/security/cve/CVE-2021-42739

https://access.redhat.com/security/cve/CVE-2021-43389

https://access.redhat.com/security/cve/CVE-2021-43976

https://access.redhat.com/security/cve/CVE-2021-44733

https://access.redhat.com/security/cve/CVE-2021-45485

https://access.redhat.com/security/cve/CVE-2021-45486

https://access.redhat.com/security/cve/CVE-2022-0001

https://access.redhat.com/security/cve/CVE-2022-0002

https://access.redhat.com/security/cve/CVE-2022-0286

https://access.redhat.com/security/cve/CVE-2022-0322

https://access.redhat.com/security/cve/CVE-2022-1011

https://access.redhat.com/errata/RHSA-2022:1975

https://bugzilla.redhat.com/1901726

https://bugzilla.redhat.com/1919791

https://bugzilla.redhat.com/1946684

https://bugzilla.redhat.com/1951739

https://bugzilla.redhat.com/1974079

https://bugzilla.redhat.com/1985353

https://bugzilla.redhat.com/1986473

https://bugzilla.redhat.com/1997467

https://bugzilla.redhat.com/1997961

https://bugzilla.redhat.com/1999544

https://bugzilla.redhat.com/1999675

https://bugzilla.redhat.com/2000627

https://bugzilla.redhat.com/2000694

https://bugzilla.redhat.com/2004949

https://bugzilla.redhat.com/2010463

https://bugzilla.redhat.com/2013180

https://bugzilla.redhat.com/2014230

https://bugzilla.redhat.com/2016169

https://bugzilla.redhat.com/2018205

https://bugzilla.redhat.com/2025003

https://bugzilla.redhat.com/2025726

https://bugzilla.redhat.com/2027239

https://bugzilla.redhat.com/2029923

https://bugzilla.redhat.com/2030747

https://bugzilla.redhat.com/2034342

https://bugzilla.redhat.com/2035652

https://bugzilla.redhat.com/2036934

https://bugzilla.redhat.com/2037019

https://bugzilla.redhat.com/2039911

https://bugzilla.redhat.com/2039914

https://bugzilla.redhat.com/2042822

https://bugzilla.redhat.com/2061700

https://bugzilla.redhat.com/2061712

https://bugzilla.redhat.com/2061721

https://bugzilla.redhat.com/2064855

插件详情

严重性: Critical

ID: 161034

文件名: redhat-RHSA-2022-1975.nasl

版本: 1.6

类型: local

代理: unix

发布时间: 2022/5/11

最近更新时间: 2022/9/22

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

风险信息

VPR

风险因素: High

分数: 7.4

CVSS v2

风险因素: High

基本分数: 7.9

时间分数: 6.2

矢量: AV:A/AC:M/Au:N/C:C/I:C/A:C

时间矢量: E:POC/RL:OF/RC:C

CVSS 分数来源: CVE-2021-3752

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.8

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: E:P/RL:O/RC:C

CVSS 分数来源: CVE-2021-3773

漏洞信息

CPE: cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:rhel_aus:8.6, cpe:/o:redhat:rhel_e4s:8.6, cpe:/o:redhat:rhel_eus:8.6, cpe:/o:redhat:rhel_tus:8.6, p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:redhat:enterprise_linux:kernel-rt-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules, p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2022/5/10

漏洞发布日期: 2022/5/10

参考资料信息

CVE: CVE-2020-0404, CVE-2020-13974, CVE-2020-27820, CVE-2021-0941, CVE-2021-3612, CVE-2021-3669, CVE-2021-3743, CVE-2021-3744, CVE-2021-3752, CVE-2021-3759, CVE-2021-3764, CVE-2021-3772, CVE-2021-3773, CVE-2021-4002, CVE-2021-4037, CVE-2021-4083, CVE-2021-4157, CVE-2021-4197, CVE-2021-4203, CVE-2021-20322, CVE-2021-26401, CVE-2021-29154, CVE-2021-37159, CVE-2021-41864, CVE-2021-42739, CVE-2021-43389, CVE-2021-43976, CVE-2021-44733, CVE-2021-45485, CVE-2021-45486, CVE-2022-0001, CVE-2022-0002, CVE-2022-0286, CVE-2022-0322, CVE-2022-1011

RHSA: 2022:1975

CWE: 20, 119, 125, 129, 190, 200, 284, 287, 327, 330, 354, 362, 400, 401, 416, 459, 476, 681, 787, 908