安全公告详情

NS-SA-2023-0086

2023-05-30 09:08:34

简介

moderate: rpm/gnupg2 security update

严重级别

moderate

主题

An update for rpm/gnupg2 is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

rpm: The python3-rpm package contains a module that permits applications written in the Python programming language to use the interface supplied by RPM Package Manager libraries. This package should be installed if you want to develop Python 3 programs that will manipulate RPM packages and databases.
gnupg2: GnuPG is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440 and the S/MIME standard as described by several RFCs. GnuPG 2.0 is a newer version of GnuPG with additional support for S/MIME. It has a different design philosophy that splits functionality up into several modules. The S/MIME and smartcard functionality is provided by the gnupg2-smime package.


Security Fix(es):
rpm: There is a flaw in RPM's signature functionality. OpenPGP subkeys are associated with a primary key via a "binding signature."[1] RPM does not check the binding signature of subkeys prior to importing them. If an attacker is able to add or socially engineer another party to add a malicious subkey to a legitimate public key, RPM could wrongly trust a malicious signature. The greatest impact of this flaw is to data integrity. 1. https://tools.ietf.org/html/rfc4880#section-5.2.(CVE-2021-3521)
rpm: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.(CVE-2021-3421)
rpm: A flaw was found in RPM?s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.(CVE-2021-20266)
rpm: A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.(CVE-2021-20271)
rpm: bugfix
gnupg2: A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.(CVE-2022-34903)
gnupg2: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.02B5.

影响组件

  • rpm
  • gnupg2

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["python3-rpm-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-build-libs-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-libs-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-plugin-selinux-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-plugin-systemd-inhibit-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm","rpm-sign-4.14.3-24.0.1.zncgsl6_6.t3.0.x86_64.rpm"],"source":"rpm-4.14.3-24.0.1.zncgsl6_6.t3.0.src.rpm"},{"binary":["gnupg2-2.2.20-3.zncgsl6_6.x86_64.rpm","gnupg2-smime-2.2.20-3.zncgsl6_6.x86_64.rpm"],"source":"gnupg2-2.2.20-3.zncgsl6_6.src.rpm"}]}]}

CVE

参考