安全公告详情

NS-SA-2025-0050

2025-03-07 15:38:31

简介

important: openssh/unbound security update

严重级别

important

主题

An update for openssh/unbound is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

openssh:
unbound:


Security Fix(es):
openssh: A flaw was found in the OpenSSH server (sshd), which introduced a double-free vulnerability during options.kex_algorithms handling. An unauthenticated attacker can trigger the double-free in the default configuration.(CVE-2023-25136)
openssh: A vulnerability was found in OpenSSH. The PKCS#11 feature in the ssh-agent in OpenSSH has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system (the code in /usr/lib is not necessarily safe for loading into ssh-agent). This flaw allows an attacker with control of the forwarded agent-socket on the server and the ability to write to the filesystem of the client host to execute arbitrary code with the privileges of the user running the ssh-agent.(CVE-2023-38408)
openssh: A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.(CVE-2023-48795)
openssh: A flaw was found in OpenSSH. When specifying destination constraints while adding PKCS#11-hosted private keys, the constraints only apply to the first key even in cases where the token returns multiple keys.(CVE-2023-51384)
openssh: A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.(CVE-2023-51385)
openssh: A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.(CVE-2024-6387)
openssh: bugfix
unbound: Processing specially crafted responses coming from DNSSEC-signed zones can lead to uncontrolled CPU usage, leading to a Denial of Service in the DNSSEC-validating resolver side. This vulnerability applies only for systems where DNSSEC validation is enabled.(CVE-2023-50387)
unbound: A flaw was found in bind9. By flooding a DNSSEC resolver with responses coming from a DNSEC-signed zone using NSEC3, an attacker can lead the targeted resolver to a CPU exhaustion, further leading to a Denial of Service on the targeted host. This vulnerability applies only for systems where DNSSEC validation is enabled.(CVE-2023-50868)
unbound: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.01B6.

影响组件

  • openssh
  • unbound

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["openssh-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-askpass-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-clients-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-clients-core-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-core-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-server-9.3p2-1.zncgsl7.29.x86_64.rpm","openssh-server-core-9.3p2-1.zncgsl7.29.x86_64.rpm"],"source":"openssh-9.3p2-1.zncgsl7.29.src.rpm"},{"binary":["python3-unbound-1.17.1-2.zncgsl7.2.x86_64.rpm","unbound-anchor-1.17.1-2.zncgsl7.2.x86_64.rpm","unbound-libs-1.17.1-2.zncgsl7.2.x86_64.rpm"],"source":"unbound-1.17.1-2.zncgsl7.2.src.rpm"}]}]}
CGSL MAIN 7.02
  • openssh-9.3p2-1.zncgsl7.29.src.rpm
    • openssh-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-askpass-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-clients-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-clients-core-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-core-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-server-9.3p2-1.zncgsl7.29.x86_64.rpm
    • openssh-server-core-9.3p2-1.zncgsl7.29.x86_64.rpm
  • unbound-1.17.1-2.zncgsl7.2.src.rpm
    • python3-unbound-1.17.1-2.zncgsl7.2.x86_64.rpm
    • unbound-anchor-1.17.1-2.zncgsl7.2.x86_64.rpm
    • unbound-libs-1.17.1-2.zncgsl7.2.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108