安全公告详情

NS-SA-2023-0011

2023-04-11 10:31:16

简介

important: httpd/qt5-qtserialport security update

严重级别

important

主题

An update for httpd/qt5-qtserialport is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

httpd: The mod_ldap and mod_authnz_ldap modules add support for LDAP authentication to the Apache HTTP Server.
qt5-qtserialport: Qt Serial Port provides the basic functionality, which includes configuring, I/O operations, getting and setting the control signals of the RS-232 pinouts.


Security Fix(es):
httpd: A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.(CVE-2021-26691)
httpd: A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.(CVE-2021-34798)
httpd: A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network.(CVE-2021-40438)
httpd: A buffer overflow flaw in httpd's lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.(CVE-2021-44790)
httpd: A flaw was found in httpd. The inbound connection is not closed when it fails to discard the request body, which may expose the server to HTTP request smuggling.(CVE-2022-22720)
httpd: An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.(CVE-2021-39275)
httpd: bugfix
qt5-qtserialport: QXmlStream in Qt 5.x before 5.11.3 has a double-free or corruption during parsing of a specially crafted illegal XML document.(CVE-2018-15518)
qt5-qtserialport: An issue was discovered in Qt before 5.11.3. A malformed GIF image causes a NULL pointer dereference in QGifHandler resulting in a segmentation fault.(CVE-2018-19870)
qt5-qtserialport: An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.(CVE-2018-19873)
qt5-qtserialport: An issue was discovered in Qt before 5.11.3. There is QTgaFile Uncontrolled Resource Consumption.(CVE-2018-19871)
qt5-qtserialport: An issue was discovered in Qt before 5.11.3. A malformed SVG image causes a segmentation fault in qsvghandler.cpp.(CVE-2018-19869)
qt5-qtserialport: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F15B7.

影响组件

  • httpd
  • qt5-qtserialport

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["mod_ldap-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-manual-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.noarch.rpm","mod_session-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-tools-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","mod_ssl-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-debuginfo-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-devel-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","mod_proxy_html-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm"],"source":"httpd-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.src.rpm"},{"binary":["qt5-qtserialport-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-examples-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-doc-5.9.7-1.el7.noarch.rpm","qt5-qtserialport-devel-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-debuginfo-5.9.7-1.el7.x86_64.rpm"],"source":"qt5-qtserialport-5.9.7-1.el7.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["mod_ldap-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-manual-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.noarch.rpm","mod_session-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-tools-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","mod_ssl-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-debuginfo-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","httpd-devel-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm","mod_proxy_html-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.x86_64.rpm"],"source":"httpd-2.4.6-97.el7_9.5.cgslv5_5.0.2.gf2adb66.src.rpm"},{"binary":["qt5-qtserialport-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-examples-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-doc-5.9.7-1.el7.noarch.rpm","qt5-qtserialport-devel-5.9.7-1.el7.x86_64.rpm","qt5-qtserialport-debuginfo-5.9.7-1.el7.x86_64.rpm"],"source":"qt5-qtserialport-5.9.7-1.el7.src.rpm"}]}]}

CVE

参考