安全公告详情

NS-SA-2025-0246

2025-10-23 19:59:52

简介

important: sqlite/sudo security update

严重级别

important

主题

An update for sqlite/sudo is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

sqlite:
sudo:


Security Fix(es):
sqlite: A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.(CVE-2025-6965)
sqlite: bugfix
sudo: A privilege escalation vulnerability was found in Sudo. In certain configurations, unauthorized users can gain elevated system privileges via the Sudo host option (`-h` or `--host`). When using the default sudo security policy plugin (sudoers), the host option is intended to be used in conjunction with the list option (`-l` or `--list`) to determine what permissions a user has on a different system. However, this restriction can be bypassed, allowing a user to elevate their privileges on one system to the privileges they may have on a different system, effectively ignoring the host identifier in any sudoers rules. This vulnerability is particularly impactful for systems that share a single sudoers configuration file across multiple computers or use network-based user directories, such as LDAP, to provide sudoers rules on a system.(CVE-2025-32462)
sudo: A flaw was found in Sudo. This flaw allows a local attacker to escalate their privileges by tricking Sudo into loading an arbitrary shared library using the user-specified root directory via the `-R` (`--chroot`) option. An attacker can run arbitrary commands as root on systems that support `/etc/nsswitch.conf`.(CVE-2025-32463)
sudo: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.04B7.

影响组件

  • sqlite
  • sudo

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["sqlite-tools-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-libs-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-tcl-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-libs-core-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-devel-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-analyzer-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-3.42.0-3.zncgsl7.5.x86_64.rpm","sqlite-doc-3.42.0-3.zncgsl7.5.noarch.rpm","lemon-3.42.0-3.zncgsl7.5.x86_64.rpm"],"source":"sqlite-3.42.0-3.zncgsl7.5.src.rpm"},{"binary":["sudo-devel-1.9.15p5-1.zncgsl7.7.x86_64.rpm","sudo-python-plugin-1.9.15p5-1.zncgsl7.7.x86_64.rpm","sudo-1.9.15p5-1.zncgsl7.7.x86_64.rpm","sudo-logsrvd-1.9.15p5-1.zncgsl7.7.x86_64.rpm","sudo-core-1.9.15p5-1.zncgsl7.7.x86_64.rpm"],"source":"sudo-1.9.15p5-1.zncgsl7.7.src.rpm"}]}]}

CVE

参考