Lucene search

K
centosCentOS ProjectCESA-2020:1172
HistoryApr 08, 2020 - 7:12 p.m.

qt security update

2020-04-0819:12:37
CentOS Project
lists.centos.org
103

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.6%

CentOS Errata and Security Advisory CESA-2020:1172

The qt packages contain a software toolkit that simplifies the task of writing and maintaining Graphical User Interface (GUI) applications for the X Window System.

Security Fix(es):

  • qt5-qtbase: Double free in QXmlStreamReader (CVE-2018-15518)

  • qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp (CVE-2018-19872)

  • qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service (CVE-2018-19869)

  • qt5-qtbase: QImage allocation failure in qgifhandler (CVE-2018-19870)

  • qt5-qtimageformats: QTgaFile CPU exhaustion (CVE-2018-19871)

  • qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file (CVE-2018-19873)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2020-April/032652.html

Affected packages:
qt
qt-assistant
qt-config
qt-demos
qt-devel
qt-devel-private
qt-doc
qt-examples
qt-mysql
qt-odbc
qt-postgresql
qt-qdbusviewer
qt-qvfb
qt-x11

Upstream details at:
https://access.redhat.com/errata/RHSA-2020:1172

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.6%