安全公告详情

NS-SA-2019-0065

2019-07-17 14:58:09

简介

moderate: wget/openssl security update

严重级别

moderate

主题

An update for wget/openssl is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

wget: GNU Wget is a file retrieval utility which can use either the HTTP or FTP protocols. Wget features include the ability to work in the background while you are logged out, recursive retrieval of directories, file name wildcard matching, remote file timestamp storage and comparison, use of Rest with FTP servers and Range with HTTP servers to retrieve files over slow or unstable connections, support for Proxy servers, and configurability.
openssl: The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.


Security Fix(es):
wget: A cookie injection flaw was found in wget. An attacker can create a malicious website which, when accessed, overrides cookies belonging to arbitrary domains.(CVE-2018-0494)
wget: bugfix
openssl: While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.(CVE-2017-3735)
openssl: Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.(CVE-2018-0495)
openssl: OpenSSL RSA key generation was found to be vulnerable to cache side-channel attacks. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover parts of the private key.(CVE-2018-0737)
openssl: tructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).(CVE-2018-0739)
openssl: A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.(CVE-2018-5407)
openssl: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).(CVE-2018-0732)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F12.

影响组件

  • wget
  • openssl

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["wget-1.14-18.el7.x86_64.rpm","wget-debuginfo-1.14-18.el7.x86_64.rpm"],"source":"wget-1.14-18.el7.src.rpm"},{"binary":["openssl-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm","openssl-debuginfo-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm","openssl-devel-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm","openssl-libs-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm","openssl-perl-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm","openssl-static-1.0.2k-16.el7_6.1.cgslv5.x86_64.rpm"],"source":"openssl-1.0.2k-16.el7_6.1.cgslv5.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["wget-debuginfo-1.14-18.el7.x86_64.rpm","wget-1.14-18.el7.x86_64.rpm"],"source":"wget-1.14-18.el7.src.rpm"},{"binary":["openssl-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-crypto-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-debuginfo-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-devel-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-libs-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-perl-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm","openssl-static-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.x86_64.rpm"],"source":"openssl-1.0.2k-16.el7_6.1.cgslv5.0.1.g94e9187.lite.src.rpm"}]}]}

CVE

参考