安全公告详情

NS-SA-2026-0031

2026-03-04 21:56:27

简介

important: libwebp/openssh security update

严重级别

important

主题

An update for libwebp/openssh is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libwebp:
openssh:


Security Fix(es):
libwebp: A heap-based buffer flaw was found in the way libwebp, a library used to process "WebP" image format data, processes certain specially formatted WebP images. An attacker could use this flaw to crash or execute remotely arbitrary code in an application such as a web browser compiled with this library.(CVE-2023-4863)
libwebp: bugfix
openssh: A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.(CVE-2023-48795)
openssh: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.04P3B6.

影响组件

  • libwebp
  • openssh

影响产品

  • CGSL MAIN 6.06 (SP)

更新包

{"fix":[{"product":"CGSL MAIN 6.06 (SP)","pkgs":[{"binary":["libwebp-debugsource-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-tools-debuginfo-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-tools-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-devel-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-debuginfo-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-java-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-java-debuginfo-1.2.0-7.0.1.zncgsl6.x86_64.rpm","libwebp-1.2.0-7.0.1.zncgsl6.x86_64.rpm"],"source":"libwebp-1.2.0-7.0.1.zncgsl6.src.rpm"},{"binary":["openssh-keycat-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-server-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-clients-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-debuginfo-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-askpass-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-askpass-debuginfo-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-server-debuginfo-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-debugsource-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-keycat-debuginfo-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-clients-debuginfo-8.5p1-3.zncgsl6.t5.3.x86_64.rpm","openssh-8.5p1-3.zncgsl6.t5.3.x86_64.rpm"],"source":"openssh-8.5p1-3.zncgsl6.t5.3.src.rpm"}]}]}

CVE

参考