安全公告详情

NS-SA-2022-0065

2022-05-08 20:35:23

简介

important: gssdp/libwebp security update

严重级别

important

主题

An update for gssdp/libwebp is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

gssdp: This package contains developer documentation for gssdp.
libwebp: This package provides debug information for package libwebp-tools. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
gssdp: The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.(CVE-2020-12695)
gssdp: bugfix
libwebp: A flaw was found in libwebp. A heap-based buffer overflow was found in PutLE16(). The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2018-25011)
libwebp: A flaw was found in libwebp. A heap-based buffer overflow in functions WebPDecode*Into is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-36328)
libwebp: A flaw was found in libwebp. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.(CVE-2020-36329)
libwebp: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.80B5.

影响组件

  • gssdp
  • libwebp

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["gssdp-docs-1.0.5-1.el8.noarch.rpm","gssdp-debugsource-1.0.5-1.el8.x86_64.rpm","gssdp-debuginfo-1.0.5-1.el8.x86_64.rpm","gssdp-utils-1.0.5-1.el8.x86_64.rpm","gssdp-devel-1.0.5-1.el8.x86_64.rpm","gssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm","gssdp-1.0.5-1.el8.x86_64.rpm"],"source":"gssdp-1.0.5-1.el8.src.rpm"},{"binary":["libwebp-tools-1.0.0-3.el8_4.x86_64.rpm","libwebp-debugsource-1.0.0-3.el8_4.x86_64.rpm","libwebp-debuginfo-1.0.0-3.el8_4.x86_64.rpm","libwebp-java-1.0.0-3.el8_4.x86_64.rpm","libwebp-java-debuginfo-1.0.0-3.el8_4.x86_64.rpm","libwebp-tools-debuginfo-1.0.0-3.el8_4.x86_64.rpm","libwebp-1.0.0-3.el8_4.x86_64.rpm","libwebp-devel-1.0.0-3.el8_4.x86_64.rpm"],"source":"libwebp-1.0.0-3.el8_4.src.rpm"}]}]}

CVE

参考