安全公告详情

NS-SA-2025-0228

2025-09-30 16:49:52

简介

important: coreutils/bind security update

严重级别

important

主题

An update for coreutils/bind is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

coreutils:
bind:


Security Fix(es):
coreutils: The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.(CVE-2015-4041)
coreutils: Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.(CVE-2015-4042)
coreutils: In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.(CVE-2017-18018)
coreutils: Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.(CVE-2017-7476)
coreutils: The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.(CVE-2018-17942)
coreutils: bugfix
bind: BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via certain SIG queries, which cause an assertion failure when multiple RRsets are returned.(CVE-2006-4095)
bind: Unspecified vulnerability in query.c in ISC BIND 9.4.0, and 9.5.0a1 through 9.5.0a3, when recursion is enabled, allows remote attackers to cause a denial of service (daemon exit) via a sequence of queries processed by the query_addsoa function.(CVE-2007-2241)
bind: The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.(CVE-2007-2925)
bind: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • coreutils
  • bind

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["coreutils-8.30-12.zncgsl6.t1.0.x86_64.rpm","coreutils-common-8.30-12.zncgsl6.t1.0.x86_64.rpm"],"source":"coreutils-8.30-12.zncgsl6.t1.0.src.rpm"},{"binary":["bind-export-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-libs-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-libs-lite-9.11.36-3.zncgsl6_6.1.x86_64.rpm","bind-license-9.11.36-3.zncgsl6_6.1.noarch.rpm","bind-utils-9.11.36-3.zncgsl6_6.1.x86_64.rpm","python3-bind-9.11.36-3.zncgsl6_6.1.noarch.rpm"],"source":"bind-9.11.36-3.zncgsl6_6.1.src.rpm"}]}]}

CVE

参考