Safety Announcement Details

NS-SA-2023-0094

2023-05-30 09:08:34

Introduction

important: bind/polkit security update

Severity Level

important

Theme

An update for bind/polkit is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

Description

bind: BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. This package set contains only export version of BIND libraries, that are used for building ISC DHCP.
polkit: polkit is a toolkit for defining and handling authorizations. It is used for allowing unprivileged processes to speak to privileged processes.


Security Fix(es):
bind: A flaw was found in bind. Updates to "Update-policy" rules of type "subdomain" are treated as if they were of type "zonesub" which allows updates to all parts of the zone along with the intended subdomain. The highest threat from this vulnerability is to data integrity.(CVE-2020-8624)
bind: A flaw was found in bind. An assertion failure can occur when trying to verify a truncated response to a TSIG-signed request. The highest threat from this vulnerability is to system availability.(CVE-2020-8622)
bind: A flaw was found in the way bind implemented tunable which limited simultaneous TCP client connections. A remote attacker could use this flaw to exhaust the pool of file descriptors available to named, potentially affecting network connections and the management of files such as log files or zone journal files. In cases where the named process is not limited by OS-enforced per-process limits, this could additionally potentially lead to exhaustion of all available free file descriptors on that system.(CVE-2018-5743)
bind: A flaw was found in the Bind package. By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.(CVE-2022-38177)
bind: A buffer overflow flaw was found in the SPNEGO implementation used by BIND. This flaw allows a remote attacker to cause the named process to crash or possibly perform remote code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2020-8625)
bind: An assertion failure was found in BIND, which checks the validity of messages containing TSIG resource records. This flaw allows an attacker that knows or successfully guesses the name of the TSIG key used by the server to use a specially-crafted message, potentially causing a BIND server to reach an inconsistent state or cause a denial of service. A majority of BIND servers have an internally-generated TSIG session key whose name is trivially guessable, and that key exposes the vulnerability unless specifically disabled.(CVE-2020-8617)
bind: A race condition leading to denial of service was found in the way bind handled certain malformed packets. A remote attacker who could cause the bind resolver to perform queries on a server, which responds deliberately with malformed answers, could cause named to exit.(CVE-2019-6471)
bind: A flaw was found in the way bind processes broken responses from authoritative servers. This caching mechanism could be abused by an attacker to significantly degrade resolver performance.(CVE-2021-25219)
bind: A flaw was found in bind. An assertion failure can occur when a specially crafted query for a zone signed with an RSA key. BIND must be compiled with "--enable-native-pkcs11" for the system to be affected. The highest threat from this vulnerability is to system availability.(CVE-2020-8623)
bind: It was found that the controls for zone transfer were not properly applied to Dynamically Loadable Zones (DLZs). An attacker acting as a DNS client could use this flaw to request and receive a zone transfer of a DLZ even when not permitted to do so by the "allow-transfer" ACL.(CVE-2019-6465)
bind: A flaw was found in BIND, where it does not sufficiently limit the number of fetches that can be performed while processing a referral response. This flaw allows an attacker to cause a denial of service attack. The attacker can also exploit this behavior to use the recursing server as a reflector in a reflection attack with a high amplification factor.(CVE-2020-8616)
bind: A flaw was found in the Bind package, where the DNSSEC verification code for the EdDSA algorithm leaks memory when there is a signature length mismatch. By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak, resulting in crashing the program.(CVE-2022-38178)
bind: bugfix
polkit: ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2021-3560)
polkit: There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned.(CVE-2021-4115)
polkit: A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.(CVE-2021-4034)
polkit: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.02B5.

Impact Components

  • bind
  • polkit

Impact Product

  • CGSL MAIN 6.06

Update Package

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["bind-export-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-libs-lite-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-license-9.11.36-3.zncgsl6_6.1.noarch.rpm","bind-utils-9.11.36-3.zncgsl6_6.1.x86_64.rpm","python3-bind-9.11.36-3.zncgsl6_6.1.noarch.rpm"],"source":"bind-9.11.36-3.zncgsl6_6.1.src.rpm"},{"binary":["polkit-0.115-13.zncgsl6.2.x86_64.rpm","polkit-devel-0.115-13.zncgsl6.2.x86_64.rpm","polkit-docs-0.115-13.zncgsl6.2.noarch.rpm","polkit-libs-0.115-13.zncgsl6.2.x86_64.rpm"],"source":"polkit-0.115-13.zncgsl6.2.src.rpm"}]}]}
CGSL MAIN 6.06
  • bind-9.11.36-3.zncgsl6_6.1.src.rpm
    • bind-export-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm
    • bind-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm
    • bind-libs-lite-9.11.36-3.zncgsl6_6.1.x86_64.rpm
    • bind-license-9.11.36-3.zncgsl6_6.1.noarch.rpm
    • bind-utils-9.11.36-3.zncgsl6_6.1.x86_64.rpm
    • python3-bind-9.11.36-3.zncgsl6_6.1.noarch.rpm
  • polkit-0.115-13.zncgsl6.2.src.rpm
    • polkit-0.115-13.zncgsl6.2.x86_64.rpm
    • polkit-devel-0.115-13.zncgsl6.2.x86_64.rpm
    • polkit-docs-0.115-13.zncgsl6.2.noarch.rpm
    • polkit-libs-0.115-13.zncgsl6.2.x86_64.rpm

CVE

Consult

© 2004-2023 Guangdong ZTE NewStart Technology Co., Ltd Copyright 粤ICP备15061780号-2

Hotline:400-033-0108