安全公告详情

NS-SA-2021-0132

2021-09-24 00:32:48

简介

important: nettle/flatpak security update

严重级别

important

主题

An update for nettle/flatpak is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

nettle: This package provides debug information for package nettle. Debug information is useful when developing applications that use this package or when debugging this package.
flatpak: This package provides debug information for package flatpak-libs. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
nettle: A flaw was found in Nettle, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-20305)
nettle: bugfix
flatpak: A sandbox escape flaw was found in the way flatpak handled special tokens in ".desktop" files. This flaw allows an attacker to gain access to files that are not ordinarily allowed by the app's permissions. The highest threat from this vulnerability is to confidentiality and integrity.(CVE-2021-21381)
flatpak: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.70B3.

影响组件

  • nettle
  • flatpak

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["nettle-debuginfo-3.4.1-4.el8_3.x86_64.rpm","nettle-debugsource-3.4.1-4.el8_3.x86_64.rpm","nettle-3.4.1-4.el8_3.x86_64.rpm","nettle-devel-3.4.1-4.el8_3.x86_64.rpm"],"source":"nettle-3.4.1-4.el8_3.src.rpm"},{"binary":["flatpak-libs-debuginfo-1.6.2-6.el8_3.x86_64.rpm","flatpak-session-helper-debuginfo-1.6.2-6.el8_3.x86_64.rpm","flatpak-session-helper-1.6.2-6.el8_3.x86_64.rpm","flatpak-debugsource-1.6.2-6.el8_3.x86_64.rpm","flatpak-debuginfo-1.6.2-6.el8_3.x86_64.rpm","flatpak-devel-1.6.2-6.el8_3.x86_64.rpm","flatpak-tests-debuginfo-1.6.2-6.el8_3.x86_64.rpm","flatpak-selinux-1.6.2-6.el8_3.noarch.rpm","flatpak-tests-1.6.2-6.el8_3.x86_64.rpm","flatpak-libs-1.6.2-6.el8_3.x86_64.rpm","flatpak-1.6.2-6.el8_3.x86_64.rpm"],"source":"flatpak-1.6.2-6.el8_3.src.rpm"}]}]}

CVE

参考