安全公告详情

NS-SA-2023-0091

2023-05-30 09:08:34

简介

important: dhcp/openssl security update

严重级别

important

主题

An update for dhcp/openssl is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

dhcp: DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. This package provides the ISC DHCP client.
openssl: The OpenSSL toolkit provides support for secure communications between machines. OpenSSL includes a certificate management tool and shared libraries which provide various cryptographic algorithms and protocols.


Security Fix(es):
dhcp: A flaw was found in the Dynamic Host Configuration Protocol (DHCP). There is a discrepancy between the code that handles encapsulated option information in leases transmitted "on the wire" and the code which reads and parses lease information after it has been written to disk storage. This flaw allows an attacker to deliberately cause a situation where dhcpd while running in DHCPv4 or DHCPv6 mode, or the dhclient attempts to read a stored lease that contains option information, to trigger a stack-based buffer overflow in the option parsing code for colon-separated hex digits values. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability.(CVE-2021-25217)
dhcp: bugfix
openssl: AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed.(CVE-2022-2097)
openssl: It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.(CVE-2021-3712)
openssl: haCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).(CVE-2019-1543)
openssl: A flaw was found in OpenSSL. It is possible to trigger an infinite loop by crafting a certificate that has invalid elliptic curve parameters. Since certificate parsing happens before verification of the certificate signature, any process that parses an externally supplied certificate may be subject to a denial of service attack.(CVE-2022-0778)
openssl: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.02B5.

影响组件

  • dhcp
  • openssl

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["dhcp-client-4.3.6-47.0.1.zncgsl6.x86_64.rpm","dhcp-common-4.3.6-47.0.1.zncgsl6.noarch.rpm","dhcp-libs-4.3.6-47.0.1.zncgsl6.x86_64.rpm"],"source":"dhcp-4.3.6-47.0.1.zncgsl6.src.rpm"},{"binary":["openssl-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm","openssl-devel-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm","openssl-libs-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm"],"source":"openssl-1.1.1k-9.zncgsl6.t1.0.src.rpm"}]}]}
CGSL MAIN 6.06
  • dhcp-4.3.6-47.0.1.zncgsl6.src.rpm
    • dhcp-client-4.3.6-47.0.1.zncgsl6.x86_64.rpm
    • dhcp-common-4.3.6-47.0.1.zncgsl6.noarch.rpm
    • dhcp-libs-4.3.6-47.0.1.zncgsl6.x86_64.rpm
  • openssl-1.1.1k-9.zncgsl6.t1.0.src.rpm
    • openssl-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm
    • openssl-devel-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm
    • openssl-libs-1.1.1k-9.zncgsl6.t1.0.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108