安全公告详情

NS-SA-2024-0061

2024-09-03 09:34:50

简介

critical: openssh/dhcp security update

严重级别

critical

主题

An update for openssh/dhcp is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

openssh:
dhcp:


Security Fix(es):
openssh: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.(CVE-2023-38408)
openssh: bugfix
dhcp: A vulnerability was found in the DHCP server where the "fqdn_universe_decode()" function allocates buffer space for the contents of option 81 (fqdn) data received in a DHCP packet. The maximum length of a DNS "label" is 63 bytes. The function tests the length byte of each label contained in the "fqdn"; if it finds a label whose length byte value is larger than 63, it returns without dereferencing the buffer space. This issue causes a memory leak. On a system with access to a DHCP server, an attacker from any adjacent network could send DHCP packets crafted to include "fqdn" labels longer than 63 bytes to the DHCP server, eventually causing the server to run out of memory and crash.(CVE-2022-2929)
dhcp: An integer overflow vulnerability was found in the DHCP server. When the "option_code_hash_lookup()" function is called from "add_option()", it increases the option's "refcount" field. However, there is not a corresponding call to "option_dereference()" to decrement the "refcount" field. The "add_option()" function is only used in server responses to lease query packets. Each lease query response calls this function for several options. Hence, a DHCP server configured with "allow lease query," a remote machine with access to the server, can send lease queries for the same lease multiple times, leading to the "add_option()" function being called repeatedly. This issue could cause the reference counters to overflow and the server to abort or crash.(CVE-2022-2928)
dhcp: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.F2B12.

影响组件

  • openssh
  • dhcp

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["openssh-server-8.5p1-2.el8.cgslv6_2.16.g390fd80.x86_64.rpm","openssh-8.5p1-2.el8.cgslv6_2.16.g390fd80.x86_64.rpm","openssh-askpass-8.5p1-2.el8.cgslv6_2.16.g390fd80.x86_64.rpm","openssh-clients-8.5p1-2.el8.cgslv6_2.16.g390fd80.x86_64.rpm"],"source":"openssh-8.5p1-2.el8.cgslv6_2.16.g390fd80.src.rpm"},{"binary":["dhcp-devel-4.3.6-49.el8.x86_64.rpm","dhcp-client-4.3.6-49.el8.x86_64.rpm","dhcp-libs-4.3.6-49.el8.x86_64.rpm","dhcp-common-4.3.6-49.el8.noarch.rpm","dhcp-server-4.3.6-49.el8.x86_64.rpm"],"source":"dhcp-4.3.6-49.el8.src.rpm"}]}]}

CVE

参考