安全公告详情

NS-SA-2023-0130

2023-10-10 14:36:08

简介

important: libjpeg-turbo/python3 security update

严重级别

important

主题

An update for libjpeg-turbo/python3 is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libjpeg-turbo: The libjpeg-turbo package contains a library of functions for manipulating JPEG images.
python3: This is the internal interpreter of the Python language for the system. To use Python yourself, please install one of the available Python 3 packages, for example python36.


Security Fix(es):
libjpeg-turbo: A flaw was found in libjpeg-turbo (versions 2.0.91 and 2.0.90) and is vulnerable to a denial of service issue caused by a divide by zero when processing a crafted GIF image. The highest threat from this vulnerabilityis to system availability.(CVE-2021-20205)
libjpeg-turbo: A flaw was found in the libjpeg-turbo package, where it is susceptible to an out-of-bounds read on crafted input and malformed files. Proper bounds checking is not enforced when processing JPEG files. The highest threat from this vulnerability is system availability.(CVE-2021-37972)
libjpeg-turbo: A heap-based buffer overflow vulnerability was found in libjpeg-turbo in the get_word_rgb_row() function in rdppm.c. The flaw occurs when the PPM reader in libjpeg-turbo mishandles use of the tjLoadImage() function for loading a 16-bit binary PPM file into a grayscale uncompressed image buffer and then loading a 16-bit binary PGM file into an RGB uncompressed image buffer. This flaw allows a remote attacker to persuade a victim to open a specially-crafted file, causing the application to crash.(CVE-2021-46822)
libjpeg-turbo: bugfix
python3: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.(CVE-2020-10735)
python3: A vulnerability was found in python. This security flaw causes an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of the URI path. This issue may lead to information disclosure.(CVE-2021-28861)
python3: A vulnerability was discovered in Python. A quadratic algorithm exists when processing inputs to the IDNA (RFC 3490) decoder, such that a crafted unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor, which could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied hostname.(CVE-2022-45061)
python3: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.03B7.

影响组件

  • libjpeg-turbo
  • python3

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["libjpeg-turbo-utils-2.0.90-6.0.1.zncgsl6.x86_64.rpm","libjpeg-turbo-devel-2.0.90-6.0.1.zncgsl6.x86_64.rpm","turbojpeg-2.0.90-6.0.1.zncgsl6.x86_64.rpm","libjpeg-turbo-doc-2.0.90-6.0.1.zncgsl6.noarch.rpm","libjpeg-turbo-2.0.90-6.0.1.zncgsl6.x86_64.rpm","turbojpeg-devel-2.0.90-6.0.1.zncgsl6.x86_64.rpm"],"source":"libjpeg-turbo-2.0.90-6.0.1.zncgsl6.src.rpm"},{"binary":["python3-idle-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","python3-tkinter-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","platform-python-devel-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","platform-python-debug-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","python3-test-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","python3-libs-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","python3-devel-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm","platform-python-3.6.8-48.0.2.zncgsl6.1.x86_64.rpm"],"source":"python3-3.6.8-48.0.2.zncgsl6.1.src.rpm"}]}]}

CVE

参考