NewStart CGSL MAIN 6.02 : kernel Multiple Vulnerabilities (NS-SA-2024-0056)

high Nessus Plugin ID 206835

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version MAIN 6.02, has kernel packages installed that are affected by multiple vulnerabilities:

- A use-after-free vulnerability in the Linux kernel's net/sched: sch_qfq component can be exploited to achieve local privilege escalation. When the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). We recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. (CVE-2023-4921)

- mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
(CVE-2020-36158)

- Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access. (CVE-2020-12362)

- usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925. (CVE-2020-12464)

- The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
(CVE-2020-24586)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL kernel packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

https://security.gd-linux.com/notice/NS-SA-2024-0056

https://security.gd-linux.com/info/CVE-2020-12362

https://security.gd-linux.com/info/CVE-2020-12464

https://security.gd-linux.com/info/CVE-2020-24586

https://security.gd-linux.com/info/CVE-2020-24587

https://security.gd-linux.com/info/CVE-2020-24588

https://security.gd-linux.com/info/CVE-2020-25670

https://security.gd-linux.com/info/CVE-2020-25671

https://security.gd-linux.com/info/CVE-2020-26139

https://security.gd-linux.com/info/CVE-2020-26141

https://security.gd-linux.com/info/CVE-2020-26143

https://security.gd-linux.com/info/CVE-2020-26144

https://security.gd-linux.com/info/CVE-2020-26145

https://security.gd-linux.com/info/CVE-2020-26147

https://security.gd-linux.com/info/CVE-2020-29660

https://security.gd-linux.com/info/CVE-2020-36158

https://security.gd-linux.com/info/CVE-2021-3564

https://security.gd-linux.com/info/CVE-2021-3573

https://security.gd-linux.com/info/CVE-2021-3600

https://security.gd-linux.com/info/CVE-2021-3679

https://security.gd-linux.com/info/CVE-2021-3732

https://security.gd-linux.com/info/CVE-2021-20194

https://security.gd-linux.com/info/CVE-2021-23134

https://security.gd-linux.com/info/CVE-2021-28971

https://security.gd-linux.com/info/CVE-2021-29650

https://security.gd-linux.com/info/CVE-2021-31829

https://security.gd-linux.com/info/CVE-2023-1206

https://security.gd-linux.com/info/CVE-2023-2860

https://security.gd-linux.com/info/CVE-2023-3358

https://security.gd-linux.com/info/CVE-2023-3609

https://security.gd-linux.com/info/CVE-2023-3611

https://security.gd-linux.com/info/CVE-2023-3776

https://security.gd-linux.com/info/CVE-2023-3812

https://security.gd-linux.com/info/CVE-2023-3863

https://security.gd-linux.com/info/CVE-2023-4004

https://security.gd-linux.com/info/CVE-2023-4132

https://security.gd-linux.com/info/CVE-2023-4206

https://security.gd-linux.com/info/CVE-2023-4207

https://security.gd-linux.com/info/CVE-2023-4208

https://security.gd-linux.com/info/CVE-2023-4387

https://security.gd-linux.com/info/CVE-2023-4459

https://security.gd-linux.com/info/CVE-2023-4622

https://security.gd-linux.com/info/CVE-2023-4921

https://security.gd-linux.com/info/CVE-2023-35827

https://security.gd-linux.com/info/CVE-2023-39193

https://security.gd-linux.com/info/CVE-2023-40283

Plugin Details

Severity: High

ID: 206835

File Name: newstart_cgsl_NS-SA-2024-0056_kernel.nasl

Version: 1.3

Type: local

Published: 9/10/2024

Updated: 9/24/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-36158

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-4921

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:bpftool, p-cpe:/a:zte:cgsl_main:kernel-tools, p-cpe:/a:zte:cgsl_main:perf, cpe:/o:zte:cgsl_main:6, p-cpe:/a:zte:cgsl_main:kernel-headers, p-cpe:/a:zte:cgsl_main:kernel, p-cpe:/a:zte:cgsl_main:kernel-tools-libs, p-cpe:/a:zte:cgsl_main:kernel-devel, p-cpe:/a:zte:cgsl_main:kernel-core, p-cpe:/a:zte:cgsl_main:kernel-modules, p-cpe:/a:zte:cgsl_main:python3-perf, p-cpe:/a:zte:cgsl_main:kernel-modules-extra

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/3/2024

Vulnerability Publication Date: 4/29/2020

Reference Information

CVE: CVE-2020-12362, CVE-2020-12464, CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-25670, CVE-2020-25671, CVE-2020-26139, CVE-2020-26141, CVE-2020-26143, CVE-2020-26144, CVE-2020-26145, CVE-2020-26147, CVE-2020-29660, CVE-2020-36158, CVE-2021-20194, CVE-2021-23134, CVE-2021-28971, CVE-2021-29650, CVE-2021-31829, CVE-2021-3564, CVE-2021-3573, CVE-2021-3600, CVE-2021-3679, CVE-2021-3732, CVE-2023-1206, CVE-2023-2860, CVE-2023-3358, CVE-2023-35827, CVE-2023-3609, CVE-2023-3611, CVE-2023-3776, CVE-2023-3812, CVE-2023-3863, CVE-2023-39193, CVE-2023-4004, CVE-2023-40283, CVE-2023-4132, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208, CVE-2023-4387, CVE-2023-4459, CVE-2023-4622, CVE-2023-4921