安全公告详情

NS-SA-2025-0049

2025-03-07 15:38:31

简介

moderate: python-configobj/openssl security update

严重级别

moderate

主题

An update for python-configobj/openssl is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

python-configobj:
openssl:


Security Fix(es):
python-configobj: A flaw was found in python-configobj via the Validator function at python-configobj/validate.py. This issue only occurs in the case of a developer putting the offending value in a server side configuration file, which could lead to a Regular Expression Denial of Service (ReDoS).(CVE-2023-26112)
python-configobj: bugfix
openssl: A flaw was found in OpenSSL. Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. OpenSSL and other certificate policy checks silently ignore invalid certificate policies in leaf certificates that are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.(CVE-2023-0465)
openssl: A flaw was found in OpenSSL. The X509_VERIFY_PARAM_add0_policy() function is documented to enable the certificate policy check when doing certificate verification implicitly. However, implementing the function does not enable the check, allowing certificates with invalid or incorrect policies to pass the certificate verification. Suddenly enabling the policy check could break existing deployments, so it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. The applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.(CVE-2023-0466)
openssl: A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.(CVE-2023-5678)
openssl: A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.(CVE-2023-6129)
openssl: A flaw was found in OpenSSL. Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an "exotic" curve encoding. Applications working with "exotic" explicit binary (GF(2^m)) curve parameters make it possible to represent invalid field polynomials with a zero constant term via the affected APIs (EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions) may terminate abruptly as a result of reading or writing outside of array bounds.(CVE-2024-9143)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.01B6.

影响组件

  • python-configobj
  • openssl

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["python3-configobj-5.0.8-3.zncgsl7.1.noarch.rpm"],"source":"python-configobj-5.0.8-3.zncgsl7.1.src.rpm"},{"binary":["openssl-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-devel-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-libs-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-static-3.0.12-3.zncgsl7.8.x86_64.rpm"],"source":"openssl-3.0.12-3.zncgsl7.8.src.rpm"}]}]}
CGSL MAIN 7.02
  • python-configobj-5.0.8-3.zncgsl7.1.src.rpm
    • python3-configobj-5.0.8-3.zncgsl7.1.noarch.rpm
  • openssl-3.0.12-3.zncgsl7.8.src.rpm
    • openssl-3.0.12-3.zncgsl7.8.x86_64.rpm
    • openssl-devel-3.0.12-3.zncgsl7.8.x86_64.rpm
    • openssl-libs-3.0.12-3.zncgsl7.8.x86_64.rpm
    • openssl-static-3.0.12-3.zncgsl7.8.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108