安全公告详情

NS-SA-2023-0135

2023-10-10 14:36:09

简介

important: sudo/tar security update

严重级别

important

主题

An update for sudo/tar is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

sudo: Sudo (superuser do) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per-host basis, copious logging of each command (providing a clear audit trail of who did what), a configurable timeout of the sudo command, and the ability to use the same configuration file (sudoers) on many different machines.
tar: The GNU tar program saves many files together in one archive and can restore individual files (or all of the files) from that archive. Tar can also be used to add supplemental files to an archive and to update or list files in the archive. Tar includes multivolume support, automatic archive compression/decompression, the ability to perform remote archives, and the ability to perform incremental and full backups. If you want to use tar for remote backups, you also need to install the rmt package on the remote box.


Security Fix(es):
sudo: Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.(CVE-2022-43995)
sudo: bugfix
tar: A flaw was found in the Tar package. When attempting to read files with old V7 tar format with a specially crafted checksum, an invalid memory read may occur. An attacker could possibly use this issue to expose sensitive information or cause a crash.(CVE-2022-48303)
tar: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.03B7.

影响组件

  • sudo
  • tar

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["sudo-1.8.29-10.zncgsl6.tm1.0.x86_64.rpm","sudo-devel-1.8.29-10.zncgsl6.tm1.0.x86_64.rpm"],"source":"sudo-1.8.29-10.zncgsl6.tm1.0.src.rpm"},{"binary":["tar-1.30-6.0.1.zncgsl6.1.x86_64.rpm","tar-doc-1.30-6.0.1.zncgsl6.1.noarch.rpm"],"source":"tar-1.30-6.0.1.zncgsl6.1.src.rpm"}]}]}

CVE

参考