安全公告详情

NS-SA-2021-0142

2021-09-24 11:20:13

简介

important: ntp/unbound security update

严重级别

important

主题

An update for ntp/unbound is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

ntp: ntpdate is a program for retrieving the date and time from NTP servers.
unbound: Unbound is a validating, recursive, and caching DNS(SEC) resolver. The C implementation of Unbound is developed and maintained by NLnet Labs. It is based on ideas and algorithms taken from a java prototype developed by Verisign labs, Nominet, Kirei and ep.net. Unbound is designed as a set of modular components, so that also DNSSEC (secure DNS) validation and stub-resolvers (that do not run as a server, but are linked into an application) are easily possible.


Security Fix(es):
ntp: A flaw was found in the Network Time Protocol (NTP), where a security issue exists that allows an off-path attacker to prevent the Network Time Protocol daemon (ntpd) from synchronizing with NTP servers not using authentication. A server mode packet with a spoofed source address sent to the client ntpd causes the next transmission to be rescheduled, even if the packet does not have a valid origin timestamp. If the packet is sent to the client frequently enough, it stops polling the server and is unable to synchronize with it.(CVE-2020-11868)
ntp: bugfix
unbound: A network amplification vulnerability was found in Unbound, in the way it processes delegation messages from one authoritative zone to another. This flaw allows an attacker to cause a denial of service or be part of an attack against another DNS server when Unbound is deployed as a recursive resolver or authoritative name server.(CVE-2020-12662)
unbound: An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.(CVE-2020-10772)
unbound: A flaw was found in unbound in versions prior to 1.10.1. An infinite loop can be created when malformed DNS answers are received from upstream servers. The highest threat from this vulnerability is to system availability.(CVE-2020-12663)
unbound: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F10B3.

影响组件

  • ntp
  • unbound

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["ntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","ntp-debuginfo-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","ntp-doc-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.noarch.rpm","ntp-perl-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.noarch.rpm","ntpdate-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","sntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm"],"source":"ntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.src.rpm"},{"binary":["unbound-1.6.6-5.el7_8.x86_64.rpm","unbound-debuginfo-1.6.6-5.el7_8.x86_64.rpm","unbound-devel-1.6.6-5.el7_8.x86_64.rpm","unbound-libs-1.6.6-5.el7_8.x86_64.rpm","unbound-python-1.6.6-5.el7_8.x86_64.rpm"],"source":"unbound-1.6.6-5.el7_8.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["ntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","ntp-debuginfo-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","ntp-doc-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.noarch.rpm","ntp-perl-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.noarch.rpm","ntpdate-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm","sntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.x86_64.rpm"],"source":"ntp-4.2.6p5-29.el7.centos.2.cgslv5_5.0.1.g7ae8308.src.rpm"},{"binary":["unbound-1.6.6-5.el7_8.x86_64.rpm","unbound-devel-1.6.6-5.el7_8.x86_64.rpm","unbound-libs-1.6.6-5.el7_8.x86_64.rpm","unbound-python-1.6.6-5.el7_8.x86_64.rpm","unbound-debuginfo-1.6.6-5.el7_8.x86_64.rpm"],"source":"unbound-1.6.6-5.el7_8.src.rpm"}]}]}

CVE

参考