RHEL 8:qt5 (RHSA-2020: 1665)

medium Nessus 插件 ID 136117

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2020: 1665 公告中提及的多个漏洞的影响。

- qt5-qtsvg: 对格式错误的 URL 引用进行的解析无效,从而导致拒绝服务 (CVE-2018-19869)

- qt5-qtimageformats: QTgaFile CPU 耗尽 (CVE-2018-19871)

- qt:格式错误的 PPM 图像造成除零错误,并导致 qppmhandler.cpp 中发生崩溃 (CVE-2018-19872)

- qt5-qtbase: qtextengine.cpp 中的 generateDirectionalRuns() 函数中的越界访问 (CVE-2019-18281)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://bugzilla.redhat.com/show_bug.cgi?id=1733150

https://bugzilla.redhat.com/show_bug.cgi?id=1733151

https://bugzilla.redhat.com/show_bug.cgi?id=1733152

https://bugzilla.redhat.com/show_bug.cgi?id=1733153

https://bugzilla.redhat.com/show_bug.cgi?id=1733154

https://bugzilla.redhat.com/show_bug.cgi?id=1733155

https://bugzilla.redhat.com/show_bug.cgi?id=1733156

https://bugzilla.redhat.com/show_bug.cgi?id=1733157

https://bugzilla.redhat.com/show_bug.cgi?id=1733158

https://bugzilla.redhat.com/show_bug.cgi?id=1733159

https://bugzilla.redhat.com/show_bug.cgi?id=1765637

https://bugzilla.redhat.com/show_bug.cgi?id=1769077

https://bugzilla.redhat.com/show_bug.cgi?id=1774418

https://bugzilla.redhat.com/show_bug.cgi?id=1775603

https://bugzilla.redhat.com/show_bug.cgi?id=1775604

https://access.redhat.com/security/updates/classification/#moderate

http://www.nessus.org/u?cc7a6ddd

http://www.nessus.org/u?dd7b3f20

https://access.redhat.com/errata/RHSA-2020:1665

https://bugzilla.redhat.com/show_bug.cgi?id=1661460

https://bugzilla.redhat.com/show_bug.cgi?id=1661465

https://bugzilla.redhat.com/show_bug.cgi?id=1691636

https://bugzilla.redhat.com/show_bug.cgi?id=1733133

https://bugzilla.redhat.com/show_bug.cgi?id=1733134

https://bugzilla.redhat.com/show_bug.cgi?id=1733135

https://bugzilla.redhat.com/show_bug.cgi?id=1733136

https://bugzilla.redhat.com/show_bug.cgi?id=1733137

https://bugzilla.redhat.com/show_bug.cgi?id=1733139

https://bugzilla.redhat.com/show_bug.cgi?id=1733140

https://bugzilla.redhat.com/show_bug.cgi?id=1733141

https://bugzilla.redhat.com/show_bug.cgi?id=1733142

https://bugzilla.redhat.com/show_bug.cgi?id=1733143

https://bugzilla.redhat.com/show_bug.cgi?id=1733144

https://bugzilla.redhat.com/show_bug.cgi?id=1733145

https://bugzilla.redhat.com/show_bug.cgi?id=1733146

https://bugzilla.redhat.com/show_bug.cgi?id=1733147

https://bugzilla.redhat.com/show_bug.cgi?id=1733148

https://bugzilla.redhat.com/show_bug.cgi?id=1733149

插件详情

严重性: Medium

ID: 136117

文件名: redhat-RHSA-2020-1665.nasl

版本: 1.12

类型: local

代理: unix

发布时间: 2020/4/29

最近更新时间: 2024/11/7

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 4.4

Vendor

Vendor Severity: Moderate

CVSS v2

风险因素: Medium

基本分数: 4.3

时间分数: 3.4

矢量: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS 分数来源: CVE-2019-18281

CVSS v3

风险因素: Medium

基本分数: 6.5

时间分数: 5.9

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

CVSS 分数来源: CVE-2018-19871

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:qt5-srpm-macros, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel, p-cpe:/a:redhat:enterprise_linux:qt5-rpm-macros, p-cpe:/a:redhat:enterprise_linux:qt5, p-cpe:/a:redhat:enterprise_linux:qt5-qtimageformats, p-cpe:/a:redhat:enterprise_linux:qt5-qdbusviewer, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-static, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols-examples, p-cpe:/a:redhat:enterprise_linux:python3-pyqt5-sip, p-cpe:/a:redhat:enterprise_linux:sip, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-static, p-cpe:/a:redhat:enterprise_linux:qt5-qtcanvas3d-examples, p-cpe:/a:redhat:enterprise_linux:qt5-doctools, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-mysql, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel-devel, p-cpe:/a:redhat:enterprise_linux:python3-qt5-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtcanvas3d, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-help, p-cpe:/a:redhat:enterprise_linux:qt5-assistant, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation-examples, p-cpe:/a:redhat:enterprise_linux:qgnomeplatform, p-cpe:/a:redhat:enterprise_linux:python-qt5-rpm-macros, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity, p-cpe:/a:redhat:enterprise_linux:qt5-qttools, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-static, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative, p-cpe:/a:redhat:enterprise_linux:qt5-qttranslations, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtx11extras-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d-examples, p-cpe:/a:redhat:enterprise_linux:qt5-devel, p-cpe:/a:redhat:enterprise_linux:python3-qt5-base, p-cpe:/a:redhat:enterprise_linux:qt5-qtconnectivity-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialbus-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns, p-cpe:/a:redhat:enterprise_linux:python-qt5, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebsockets, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia, p-cpe:/a:redhat:enterprise_linux:qt5-qtx11extras, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialbus, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-private-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtgraphicaleffects, p-cpe:/a:redhat:enterprise_linux:qt5-qtlocation, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-designer, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-gui, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols, p-cpe:/a:redhat:enterprise_linux:python3-sip-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtserialport-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-common, p-cpe:/a:redhat:enterprise_linux:qt5-qtxmlpatterns-devel, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-odbc, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-libs-designercomponents, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia-examples, p-cpe:/a:redhat:enterprise_linux:qt5-linguist, p-cpe:/a:redhat:enterprise_linux:qt5-qt3d, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland, p-cpe:/a:redhat:enterprise_linux:qt5-qtwebchannel-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtdoc, p-cpe:/a:redhat:enterprise_linux:qt5-qtscript-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qttools-common, p-cpe:/a:redhat:enterprise_linux:qt5-qtsensors-examples, p-cpe:/a:redhat:enterprise_linux:qt5-designer, p-cpe:/a:redhat:enterprise_linux:qt5-qtdeclarative-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg-examples, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2, p-cpe:/a:redhat:enterprise_linux:qt5-qtmultimedia-devel, p-cpe:/a:redhat:enterprise_linux:python3-qt5, p-cpe:/a:redhat:enterprise_linux:qt5-qtbase-postgresql, p-cpe:/a:redhat:enterprise_linux:qt5-qtquickcontrols2-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtsvg-devel, p-cpe:/a:redhat:enterprise_linux:qt5-qtwayland-devel

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2020/4/29

漏洞发布日期: 2018/12/4

参考资料信息

CVE: CVE-2018-19869, CVE-2018-19871, CVE-2018-19872, CVE-2019-18281

BID: 106338

CWE: 119, 20, 369, 400

RHSA: 2020:1665