安全公告详情

NS-SA-2023-0101

2023-07-13 18:35:22

简介

important: sudo/openssl security update

严重级别

important

主题

An update for sudo/openssl is now available for NewStart CGSL MAIN 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

sudo: Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines.
openssl: OpenSSL is a toolkit for supporting cryptography. The openssl-perl package provides Perl scripts for converting certificates and keys from other formats to the formats used by the OpenSSL toolkit.


Security Fix(es):
sudo: A vulnerability was found in sudo. Exposure in how sudoedit handles user-provided environment variables leads to arbitrary file writing with privileges of the RunAs user (usually root). The prerequisite for exploitation is that the current user must be authorized by the sudoers policy to edit a file using sudoedit.(CVE-2023-22809)
sudo: bugfix
openssl: A type confusion vulnerability was found in OpenSSL when OpenSSL X.400 addresses processing inside an X.509 GeneralName. When CRL checking is enabled (for example, the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or cause a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, of which neither needs a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. In this case, this vulnerability is likely only to affect applications that have implemented their own functionality for retrieving CRLs over a network.(CVE-2023-0286)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F50B4.

影响组件

  • sudo
  • openssl

影响产品

  • CGSL MAIN 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["sudo-debuginfo-1.8.23-10.el7_9.3.cgslv5_4.0.2.gaf09c45.x86_64.rpm","sudo-devel-1.8.23-10.el7_9.3.cgslv5_4.0.2.gaf09c45.x86_64.rpm","sudo-1.8.23-10.el7_9.3.cgslv5_4.0.2.gaf09c45.x86_64.rpm"],"source":"sudo-1.8.23-10.el7_9.3.cgslv5_4.0.2.gaf09c45.src.rpm"},{"binary":["openssl-perl-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm","openssl-devel-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm","openssl-debuginfo-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm","openssl-static-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm","openssl-libs-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm","openssl-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.x86_64.rpm"],"source":"openssl-1.0.2k-25.el7_9.cgslv5.0.4.gb023e58.src.rpm"}]}]}

CVE

参考