安全公告详情

NS-SA-2023-0006

2023-02-20 16:21:31

简介

important: bind/rsync security update

严重级别

important

主题

An update for bind/rsync is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

bind: This package provides debug information for package bind-libs. Debug information is useful when developing applications that use this package or when debugging this package.
rsync: This package provides debug sources for package rsync. Debug sources are useful when developing applications that use this package or when debugging this package.


Security Fix(es):
bind: Incremental zone transfers (IXFR) provide a way of transferring changed portion(s) of a zone between servers. An IXFR stream containing SOA records with an owner name other than the transferred zone's apex may cause the receiving named server to inadvertently remove the SOA record for the zone in question from the zone database. This leads to an assertion failure when the next SOA refresh query for that zone is made.(CVE-2021-25214)
bind: A flaw was found in the way bind processes broken responses from authoritative servers. This caching mechanism could be abused by an attacker to significantly degrade resolver performance.(CVE-2021-25219)
bind: A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.(CVE-2022-38177)
bind: A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.(CVE-2022-38178)
bind: bugfix
rsync: An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.(CVE-2018-25032)
rsync: A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.(CVE-2022-29154)
rsync: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.C0B6.

影响组件

  • bind
  • rsync

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["bind-9.11.36-3.el8_6.1.x86_64.rpm","bind-export-libs-9.11.36-3.el8_6.1.x86_64.rpm","bind-libs-9.11.36-3.el8_6.1.x86_64.rpm","bind-libs-lite-9.11.36-3.el8_6.1.x86_64.rpm","bind-license-9.11.36-3.el8_6.1.noarch.rpm","bind-utils-9.11.36-3.el8_6.1.x86_64.rpm","python3-bind-9.11.36-3.el8_6.1.noarch.rpm"],"source":"bind-9.11.36-3.el8_6.1.src.rpm"},{"binary":["rsync-3.1.3-14.el8_6.3.x86_64.rpm"],"source":"rsync-3.1.3-14.el8_6.3.src.rpm"}]}]}

CVE

参考