安全公告详情

NS-SA-2019-0206

2019-10-14 19:29:28

简介

moderate: ntp/openssl security update

严重级别

moderate

主题

An update for ntp/openssl is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

ntp: The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. This package includes ntpd (a daemon which continuously adjusts system time) and utilities used to query and configure the ntpd daemon. Perl scripts ntp-wait and ntptrace are in the ntp-perl package, ntpdate is in the ntpdate package and sntp is in the sntp package. The documentation is in the ntp-doc package.
openssl: The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.


Security Fix(es):
ntp: The ntpq and ntpdc command-line utilities that are part of ntp package are vulnerable to stack-based buffer overflow via crafted hostname. Applications using these vulnerable utilities with an untrusted input may be potentially exploited, resulting in a crash or arbitrary code execution under privileges of that application.(CVE-2018-12327)
ntp: bugfix
openssl: The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).(CVE-2018-0734)
openssl: If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).(CVE-2019-1559)
openssl: The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).(CVE-2018-0735)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F18.

影响组件

  • ntp
  • openssl

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["ntp-4.2.6p5-29.el7.centos.x86_64.rpm","ntp-debuginfo-4.2.6p5-29.el7.centos.x86_64.rpm","ntp-doc-4.2.6p5-29.el7.centos.noarch.rpm","ntp-perl-4.2.6p5-29.el7.centos.noarch.rpm","ntpdate-4.2.6p5-29.el7.centos.x86_64.rpm","sntp-4.2.6p5-29.el7.centos.x86_64.rpm"],"source":"ntp-4.2.6p5-29.el7.centos.src.rpm"},{"binary":["openssl-1.0.2k-19.el7.cgslv5.x86_64.rpm","openssl-debuginfo-1.0.2k-19.el7.cgslv5.x86_64.rpm","openssl-devel-1.0.2k-19.el7.cgslv5.x86_64.rpm","openssl-libs-1.0.2k-19.el7.cgslv5.x86_64.rpm","openssl-perl-1.0.2k-19.el7.cgslv5.x86_64.rpm","openssl-static-1.0.2k-19.el7.cgslv5.x86_64.rpm"],"source":"openssl-1.0.2k-19.el7.cgslv5.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["ntp-4.2.6p5-29.el7.centos.x86_64.rpm","ntp-debuginfo-4.2.6p5-29.el7.centos.x86_64.rpm","ntp-doc-4.2.6p5-29.el7.centos.noarch.rpm","ntp-perl-4.2.6p5-29.el7.centos.noarch.rpm","ntpdate-4.2.6p5-29.el7.centos.x86_64.rpm","sntp-4.2.6p5-29.el7.centos.x86_64.rpm"],"source":"ntp-4.2.6p5-29.el7.centos.src.rpm"},{"binary":["openssl-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-crypto-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-debuginfo-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-devel-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-libs-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-perl-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm","openssl-static-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.x86_64.rpm"],"source":"openssl-1.0.2k-19.el7.cgslv5.0.1.g72bc563.lite.src.rpm"}]}]}

CVE

参考