安全公告详情

NS-SA-2019-0193

2019-10-14 19:29:28

简介

moderate: curl/nss security update

严重级别

moderate

主题

An update for curl/nss is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

curl: libcurl is a free and easy-to-use client-side URL transfer library, supporting FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3 and RTSP. libcurl supports SSL certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP form based upload, proxies, cookies, user+password authentication (Basic, Digest, NTLM, Negotiate, Kerberos4), file transfer resume, http proxy tunneling and more.
nss: Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards.


Security Fix(es):
curl: versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.(CVE-2018-16842)
curl: bugfix
nss: Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.(CVE-2018-0495)
nss: A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.(CVE-2018-12404)
nss: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F18.

影响组件

  • curl
  • nss

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["libcurl-7.29.0-54.el7.x86_64.rpm","libcurl-devel-7.29.0-54.el7.x86_64.rpm","curl-7.29.0-54.el7.x86_64.rpm","curl-debuginfo-7.29.0-54.el7.x86_64.rpm"],"source":"curl-7.29.0-54.el7.src.rpm"},{"binary":["nss-3.44.0-4.el7.cgslv5.x86_64.rpm","nss-debuginfo-3.44.0-4.el7.cgslv5.x86_64.rpm","nss-devel-3.44.0-4.el7.cgslv5.x86_64.rpm","nss-pkcs11-devel-3.44.0-4.el7.cgslv5.x86_64.rpm","nss-sysinit-3.44.0-4.el7.cgslv5.x86_64.rpm","nss-tools-3.44.0-4.el7.cgslv5.x86_64.rpm"],"source":"nss-3.44.0-4.el7.cgslv5.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["curl-7.29.0-54.el7.x86_64.rpm","curl-debuginfo-7.29.0-54.el7.x86_64.rpm","libcurl-7.29.0-54.el7.x86_64.rpm","libcurl-devel-7.29.0-54.el7.x86_64.rpm"],"source":"curl-7.29.0-54.el7.src.rpm"},{"binary":["nss-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm","nss-debuginfo-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm","nss-devel-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm","nss-pkcs11-devel-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm","nss-sysinit-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm","nss-tools-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.x86_64.rpm"],"source":"nss-3.44.0-4.el7.cgslv5.0.1.g7ce2fc0.lite.src.rpm"}]}]}

CVE

参考