Scientific Linux Security Update : qt on SL7.x x86_64 (20200407)

critical Nessus Plugin ID 135834

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

* qt5-qtbase: Double free in QXmlStreamReader * qt: Malformed PPM image causing division by zero and crash in qppmhandler.cpp * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service * qt5-qtbase: QImage allocation failure in qgifhandler * qt5-qtimageformats: QTgaFile CPU exhaustion * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?2394a5e8

Plugin Details

Severity: Critical

ID: 135834

File Name: sl_20200407_qt_on_SL7_x.nasl

Version: 1.3

Type: local

Agent: unix

Published: 4/21/2020

Updated: 3/15/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2018-19873

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:qt, p-cpe:/a:fermilab:scientific_linux:qt-assistant, p-cpe:/a:fermilab:scientific_linux:qt-config, p-cpe:/a:fermilab:scientific_linux:qt-debuginfo, p-cpe:/a:fermilab:scientific_linux:qt-demos, p-cpe:/a:fermilab:scientific_linux:qt-devel, p-cpe:/a:fermilab:scientific_linux:qt-devel-private, p-cpe:/a:fermilab:scientific_linux:qt-doc, p-cpe:/a:fermilab:scientific_linux:qt-examples, p-cpe:/a:fermilab:scientific_linux:qt-mysql, p-cpe:/a:fermilab:scientific_linux:qt-odbc, p-cpe:/a:fermilab:scientific_linux:qt-postgresql, p-cpe:/a:fermilab:scientific_linux:qt-qdbusviewer, p-cpe:/a:fermilab:scientific_linux:qt-qvfb, p-cpe:/a:fermilab:scientific_linux:qt-x11, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/7/2020

Vulnerability Publication Date: 12/26/2018

Reference Information

CVE: CVE-2018-15518, CVE-2018-19869, CVE-2018-19870, CVE-2018-19871, CVE-2018-19872, CVE-2018-19873