安全公告详情

NS-SA-2024-0140

2024-11-20 14:49:03

简介

important: pesign/openssl security update

严重级别

important

主题

An update for pesign/openssl is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

pesign:
openssl:


Security Fix(es):
pesign: A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.(CVE-2022-3560)
pesign: bugfix
openssl: A flaw was found in openssl. A miscalculation of a buffer size was found in openssl's SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2021-3711)
openssl: A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.(CVE-2023-50782)
openssl: A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the 'no overlap' response in ALPN or uses the output as the opportunistic protocol in NPN.(CVE-2024-5535)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.09B9.

影响组件

  • pesign
  • openssl

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["pesign-0.112-26.0.1.zncgsl6.t2.0.x86_64.rpm"],"source":"pesign-0.112-26.0.1.zncgsl6.t2.0.src.rpm"},{"binary":["openssl-1.1.1k-9.zncgsl6.t6.0.x86_64.rpm","openssl-devel-1.1.1k-9.zncgsl6.t6.0.x86_64.rpm","openssl-libs-1.1.1k-9.zncgsl6.t6.0.x86_64.rpm"],"source":"openssl-1.1.1k-9.zncgsl6.t6.0.src.rpm"}]}]}

CVE

参考