安全公告详情

NS-SA-2022-0032

2022-05-08 20:17:09

简介

important: qt5-qtimageformats/xterm security update

严重级别

important

主题

An update for qt5-qtimageformats/xterm is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

qt5-qtimageformats: This package provides debug information for package qt5-qtimageformats. Debug information is useful when developing applications that use this package or when debugging this package.
xterm: This package provides debug information for package xterm. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
qt5-qtimageformats: A flaw was found in libwebp. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2018-25011)
qt5-qtimageformats: A flaw was found in libwebp. An unitialized variable is used in function ReadSymbol. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2018-25014)
qt5-qtimageformats: A flaw was found in libwebp. A heap-based buffer overflow in functions WebPDecode*Into is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-36328)
qt5-qtimageformats: A flaw was found in libwebp. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-36329)
qt5-qtimageformats: bugfix
xterm: A flaw was found in xterm. A specially crafted sequence of combining characters causes an out of bounds write leading to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.(CVE-2021-27135)
xterm: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F13B5.

影响组件

  • qt5-qtimageformats
  • xterm

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm","qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm","qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm"],"source":"qt5-qtimageformats-5.9.7-2.el7_9.src.rpm"},{"binary":["xterm-debuginfo-295-3.el7_9.1.x86_64.rpm","xterm-295-3.el7_9.1.x86_64.rpm"],"source":"xterm-295-3.el7_9.1.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm","qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm","qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm"],"source":"qt5-qtimageformats-5.9.7-2.el7_9.src.rpm"},{"binary":["xterm-debuginfo-295-3.el7_9.1.x86_64.rpm","xterm-295-3.el7_9.1.x86_64.rpm"],"source":"xterm-295-3.el7_9.1.src.rpm"}]}]}

CVE

参考