安全公告详情

NS-SA-2021-0014

2021-03-09 13:05:16

简介

moderate: libtiff/libsolv security update

严重级别

moderate

主题

An update for libtiff/libsolv is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libtiff: This package contains the header files and documentation necessary for developing programs which will manipulate TIFF format image files using the libtiff library. If you need to develop programs which will manipulate TIFF format image files, you should install this package. You'll also need to install the libtiff package.
libsolv: Applications demoing the libsolv library.


Security Fix(es):
libtiff: _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c in LibTIFF through 4.0.10 mishandle Integer Overflow checks because they rely on compiler behavior that is undefined by the applicable C standards. This can, for example, lead to an application crash.(CVE-2019-14973)
libtiff: _getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.(CVE-2019-17546)
libtiff: bugfix
libsolv: There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20532)
libsolv: There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.(CVE-2018-20533)
libsolv: ** DISPUTED ** There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.(CVE-2018-20534)
libsolv: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F29B5.

影响组件

  • libtiff
  • libsolv

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["libtiff-devel-4.0.3-35.el7.x86_64.rpm","libtiff-static-4.0.3-35.el7.x86_64.rpm","libtiff-4.0.3-35.el7.x86_64.rpm","libtiff-tools-4.0.3-35.el7.x86_64.rpm","libtiff-debuginfo-4.0.3-35.el7.x86_64.rpm"],"source":"libtiff-4.0.3-35.el7.src.rpm"},{"binary":["libsolv-demo-0.6.34-4.el7.x86_64.rpm","libsolv-devel-0.6.34-4.el7.x86_64.rpm","libsolv-0.6.34-4.el7.x86_64.rpm","python2-solv-0.6.34-4.el7.x86_64.rpm","libsolv-debuginfo-0.6.34-4.el7.x86_64.rpm","libsolv-tools-0.6.34-4.el7.x86_64.rpm"],"source":"libsolv-0.6.34-4.el7.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["libtiff-devel-4.0.3-35.el7.x86_64.rpm","libtiff-static-4.0.3-35.el7.x86_64.rpm","libtiff-4.0.3-35.el7.x86_64.rpm","libtiff-tools-4.0.3-35.el7.x86_64.rpm","libtiff-debuginfo-4.0.3-35.el7.x86_64.rpm"],"source":"libtiff-4.0.3-35.el7.src.rpm"},{"binary":["libsolv-demo-0.6.34-4.el7.x86_64.rpm","libsolv-devel-0.6.34-4.el7.x86_64.rpm","libsolv-0.6.34-4.el7.x86_64.rpm","python2-solv-0.6.34-4.el7.x86_64.rpm","libsolv-debuginfo-0.6.34-4.el7.x86_64.rpm","libsolv-tools-0.6.34-4.el7.x86_64.rpm"],"source":"libsolv-0.6.34-4.el7.src.rpm"}]}]}

CVE

参考