安全公告详情

NS-SA-2019-0068

2019-07-17 14:58:09

简介

moderate: gnutls/libkdcraw security update

严重级别

moderate

主题

An update for gnutls/libkdcraw is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

gnutls: GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures.
libkdcraw: Libkdcraw is a C++ interface around LibRaw library used to decode RAW picture files. More information about LibRaw can be found at http://www.libraw.org.


Security Fix(es):
gnutls: It was found that GnuTLS's implementation of HMAC-SHA-256 was vulnerable to Lucky Thirteen-style attack. A remote attacker could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.(CVE-2018-10844)
gnutls: It was found that GnuTLS's implementation of HMAC-SHA-384 was vulnerable to a Lucky Thirteen-style attack. A remote attacker could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.(CVE-2018-10845)
gnutls: A cache-based side channel attack was found in the way GnuTLS implements CBC-mode cipher suites. An attacker could use a combination of "Just in Time" Prime+probe and Lucky-13 attacks to recover plain text in a cross-VM attack scenario.(CVE-2018-10846)
gnutls: bugfix
libkdcraw: LibRaw is vulnerable to stack-based buffer overflow in internal/dcraw_common.cpp:quicktake_100_load_raw() function when processing specially-crafted RAW data. An attacker could potentially use this flaw to cause an arbitrary code execution or denial of service.(CVE-2018-5805)
libkdcraw: A NULL pointer dereference flaw was found in the way LibRaw processed images. An attacker could potentially use this flaw to crash applications using LibRaw by tricking them into processing crafted images.(CVE-2018-5801)
libkdcraw: An out-of-bounds read flaw was found in the way LibRaw processed images. An attacker could potentially use this flaw to crash applications using LibRaw by tricking them into processing crafted images.(CVE-2018-5802)
libkdcraw: A NULL pointer dereference vulnerability in internal/dcraw_common.cpp:leaf_hdr_load_raw() function was found in LibRaw. A user can cause a denial of service when processing specially-crafted RAW data.(CVE-2018-5806)
libkdcraw: A heap-based out-of-bounds access flaw was found in the way LibRaw processed images. An attacker could potentially use this flaw to crash applications using LibRaw by tricking them into processing crafted images.(CVE-2018-5800)
libkdcraw: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F12.

影响组件

  • gnutls
  • libkdcraw

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["gnutls-3.3.29-9.el7_6.x86_64.rpm","gnutls-c++-3.3.29-9.el7_6.x86_64.rpm","gnutls-dane-3.3.29-9.el7_6.x86_64.rpm","gnutls-debuginfo-3.3.29-9.el7_6.x86_64.rpm","gnutls-devel-3.3.29-9.el7_6.x86_64.rpm","gnutls-utils-3.3.29-9.el7_6.x86_64.rpm"],"source":"gnutls-3.3.29-9.el7_6.src.rpm"},{"binary":["libkdcraw-4.10.5-5.el7.x86_64.rpm","libkdcraw-debuginfo-4.10.5-5.el7.x86_64.rpm","libkdcraw-devel-4.10.5-5.el7.x86_64.rpm"],"source":"libkdcraw-4.10.5-5.el7.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["gnutls-3.3.29-9.el7_6.x86_64.rpm","gnutls-c++-3.3.29-9.el7_6.x86_64.rpm","gnutls-dane-3.3.29-9.el7_6.x86_64.rpm","gnutls-debuginfo-3.3.29-9.el7_6.x86_64.rpm","gnutls-devel-3.3.29-9.el7_6.x86_64.rpm","gnutls-utils-3.3.29-9.el7_6.x86_64.rpm"],"source":"gnutls-3.3.29-9.el7_6.src.rpm"},{"binary":["libkdcraw-4.10.5-5.el7.x86_64.rpm","libkdcraw-debuginfo-4.10.5-5.el7.x86_64.rpm","libkdcraw-devel-4.10.5-5.el7.x86_64.rpm"],"source":"libkdcraw-4.10.5-5.el7.src.rpm"}]}]}

CVE

参考