安全公告详情

NS-SA-2025-0049

2025-04-02 13:49:52

简介

moderate: python-configobj/openssl security update

严重级别

moderate

主题

An update for python-configobj/openssl is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

python-configobj:
openssl:


Security Fix(es):
python-configobj: A flaw was found in python-configobj via the Validator function at python-configobj/validate.py. This issue only occurs in the case of a developer putting the offending value in a server side configuration file, which could lead to a Regular Expression Denial of Service (ReDoS).(CVE-2023-26112)
python-configobj: bugfix
openssl: A flaw was found in OpenSSL, which caused the generation or checking of long X9.42 DH keys or parameters to be much slower than expected. This issue could lead to a denial of service.(CVE-2023-5678)
openssl: A flaw was found in in the POLY1305 MAC (message authentication code) implementation in OpenSSL, affecting applications running on PowerPC CPU-based platforms that utilize vector instructions, and has the potential to corrupt the internal state of these applications. If an attacker can manipulate the utilization of the POLY1305 MAC algorithm, it may lead to the corruption of the application state, resulting in various application-dependent consequences, often resulting in a crash and leading to a denial of service.(CVE-2023-6129)
openssl: A flaw was found in OpenSSL. Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an "exotic" curve encoding. Applications working with "exotic" explicit binary (GF(2^m)) curve parameters make it possible to represent invalid field polynomials with a zero constant term via the affected APIs (EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions) may terminate abruptly as a result of reading or writing outside of array bounds.(CVE-2024-9143)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.01B6.

影响组件

  • python-configobj
  • openssl

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["python3-configobj-5.0.8-3.zncgsl7.1.noarch.rpm"],"source":"python-configobj-5.0.8-3.zncgsl7.1.src.rpm"},{"binary":["openssl-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-devel-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-libs-3.0.12-3.zncgsl7.8.x86_64.rpm","openssl-static-3.0.12-3.zncgsl7.8.x86_64.rpm"],"source":"openssl-3.0.12-3.zncgsl7.8.src.rpm"}]}]}

CVE

参考