Safety Announcement Details

NS-SA-2024-0052

2024-09-03 09:34:33

Introduction

critical: libssh/rpm security update

Severity Level

critical

Theme

An update for libssh/rpm is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

Description

libssh:
rpm:


Security Fix(es):
libssh: A flaw was found in libssh. A NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.(CVE-2020-16135)
libssh: A flaw has been found in libssh. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.(CVE-2021-3634)
libssh: The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.(CVE-2014-0017)
libssh: A vulnerability was found in libssh's server-side state machine. A malicious client could create channels without first performing authentication, resulting in unauthorized access.(CVE-2018-10933)
libssh: A flaw was found with the libssh API function ssh_scp_new(). A user able to connect to a server using SCP could execute arbitrary command using a user-provided path, leading to a compromise of the remote target.(CVE-2019-14889)
libssh: A flaw was found in the way libssh handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.(CVE-2020-1730)
libssh: bugfix
rpm: A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.(CVE-2021-20271)
rpm: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.(CVE-2021-3421)
rpm: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.F2B12.

Impact Components

  • libssh
  • rpm

Impact Product

  • CGSL MAIN 6.02

Update Package

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["libssh-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.x86_64.rpm","libssh-config-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.noarch.rpm"],"source":"libssh-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.src.rpm"},{"binary":["rpm-plugin-selinux-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-build-libs-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","python3-rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-plugin-systemd-inhibit-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-sign-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-devel-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-build-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm","rpm-libs-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm"],"source":"rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.src.rpm"}]}]}
CGSL MAIN 6.02
  • libssh-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.src.rpm
    • libssh-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.x86_64.rpm
    • libssh-config-0.9.6-6.el8.cgslv6_2.2.ga9c3cbc.noarch.rpm
  • rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.src.rpm
    • rpm-plugin-selinux-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-build-libs-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • python3-rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-plugin-systemd-inhibit-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-sign-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-devel-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-build-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm
    • rpm-libs-4.14.3-14.el8_4.cgslv6_2.17.g642aa15.x86_64.rpm

CVE

Consult

© 2004-2023 Guangdong ZTE NewStart Technology Co., Ltd Copyright 粤ICP备15061780号-2

Hotline:400-033-0108