安全公告详情

NS-SA-2020-0018

2020-03-04 10:24:28

简介

critical: nss-softokn/php security update

严重级别

critical

主题

An update for nss-softokn/php is now available for NewStart CGSL MAIN 4.05.
NewStart Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

nss-softokn: Network Security Services Softoken Cryptographic Module
php: The php-xml package contains dynamic shared objects which add support to PHP for manipulating XML documents using the DOM tree, and performing XSL transformations on XML documents.


Security Fix(es):
nss-softokn: A heap-based buffer overflow was found in the NSC_EncryptUpdate() function in Mozilla nss. A remote attacker could trigger this flaw via SRTP encrypt or decrypt operations, to execute arbitrary code with the permissions of the user running the application (compiled with nss). While the attack complexity is high, the impact to confidentiality, integrity, and availability are high as well.(CVE-2019-11745)
nss-softokn: bugfix
php: In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.(CVE-2019-11043)
php: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 4.05.F17.

影响组件

  • nss-softokn
  • php

影响产品

  • CGSL MAIN 4.05

更新包

{"fix":[{"product":"CGSL MAIN 4.05","pkgs":[{"binary":["nss-softokn-3.44.0-6.el6_10.x86_64.rpm","nss-softokn-devel-3.44.0-6.el6_10.x86_64.rpm","nss-softokn-debuginfo-3.44.0-6.el6_10.x86_64.rpm","nss-softokn-freebl-3.44.0-6.el6_10.x86_64.rpm","nss-softokn-freebl-devel-3.44.0-6.el6_10.x86_64.rpm"],"source":"nss-softokn-3.44.0-6.el6_10.src.rpm"},{"binary":["php-xml-5.3.3-50.el6_10.x86_64.rpm","php-xmlrpc-5.3.3-50.el6_10.x86_64.rpm","php-zts-5.3.3-50.el6_10.x86_64.rpm","php-5.3.3-50.el6_10.x86_64.rpm","php-bcmath-5.3.3-50.el6_10.x86_64.rpm","php-cli-5.3.3-50.el6_10.x86_64.rpm","php-common-5.3.3-50.el6_10.x86_64.rpm","php-dba-5.3.3-50.el6_10.x86_64.rpm","php-debuginfo-5.3.3-50.el6_10.x86_64.rpm","php-devel-5.3.3-50.el6_10.x86_64.rpm","php-embedded-5.3.3-50.el6_10.x86_64.rpm","php-enchant-5.3.3-50.el6_10.x86_64.rpm","php-fpm-5.3.3-50.el6_10.x86_64.rpm","php-gd-5.3.3-50.el6_10.x86_64.rpm","php-imap-5.3.3-50.el6_10.x86_64.rpm","php-intl-5.3.3-50.el6_10.x86_64.rpm","php-ldap-5.3.3-50.el6_10.x86_64.rpm","php-mbstring-5.3.3-50.el6_10.x86_64.rpm","php-mysql-5.3.3-50.el6_10.x86_64.rpm","php-odbc-5.3.3-50.el6_10.x86_64.rpm","php-pdo-5.3.3-50.el6_10.x86_64.rpm","php-pgsql-5.3.3-50.el6_10.x86_64.rpm","php-process-5.3.3-50.el6_10.x86_64.rpm","php-pspell-5.3.3-50.el6_10.x86_64.rpm","php-recode-5.3.3-50.el6_10.x86_64.rpm","php-snmp-5.3.3-50.el6_10.x86_64.rpm","php-soap-5.3.3-50.el6_10.x86_64.rpm","php-tidy-5.3.3-50.el6_10.x86_64.rpm"],"source":"php-5.3.3-50.el6_10.src.rpm"}]}]}

CVE

参考