安全公告详情

NS-SA-2023-0076

2023-05-30 09:08:33

简介

important: glibc/libksba security update

严重级别

important

主题

An update for glibc/libksba is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

glibc: This package provides compatibility support for applications that expect libpthread_nonshared.a to exist. The support provided is in the form of an empty libpthread_nonshared.a that allows dynamic links to succeed. Such applications should be adjusted to avoid linking against libpthread_nonshared.a which is no longer used. The static library libpthread_nonshared.a is an internal implementation detail of the C runtime and should not be expected to exist.
libksba: KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.


Security Fix(es):
glibc: A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create() in the sunrpc's svc_unix.c module of the GNU C Library (aka glibc) through 2.34. This vulnerability copies its path argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) then it will lead to arbitrary code execution.(CVE-2022-23218)
glibc: A stack based buffer-overflow vulnerability was found in the deprecated compatibility function clnt_create() in the sunrpc's clnt_gen.c module of the GNU C Library (aka glibc) through 2.34. This vulnerability copies its hostname argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) lead to arbitrary code execution.(CVE-2022-23219)
glibc: A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.(CVE-2021-3999)
glibc: bugfix
libksba: A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.(CVE-2022-3515)
libksba: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.02B5.

影响组件

  • glibc
  • libksba

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["compat-libpthread-nonshared-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-all-langpacks-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-common-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-devel-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-gconv-extra-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-headers-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-langpack-en-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-langpack-zh-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-locale-source-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","glibc-minimal-langpack-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","libnsl-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm","nss_db-2.28-189.5.0.1.zncgsl6_6.t3.0.x86_64.rpm"],"source":"glibc-2.28-189.5.0.1.zncgsl6_6.t3.0.src.rpm"},{"binary":["libksba-1.3.5-8.0.1.zncgsl6_6.x86_64.rpm"],"source":"libksba-1.3.5-8.0.1.zncgsl6_6.src.rpm"}]}]}

CVE

参考