安全公告详情

NS-SA-2020-0091

2020-12-08 09:15:38

简介

important: libxml2/mailman security update

严重级别

important

主题

An update for libxml2/mailman is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libxml2: This library allows to manipulate XML files. It includes support to read, modify and write XML and HTML files. There is DTDs support this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM like representations. In this case one can use the built-in XPath and XPointer implementation to select sub nodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to an URI library.
mailman: Mailman is software to help manage email discussion lists, much like Majordomo and Smartmail. Unlike most similar products, Mailman gives each mailing list a webpage, and allows users to subscribe, unsubscribe, etc. over the Web. Even the list manager can administer his or her list entirely from the Web. Mailman also integrates most things people want to do with mailing lists, including archiving, mail <-> news gateways, and so on. Documentation can be found in: /usr/share/doc/mailman-2.1.15 When the package has finished installing, you will need to perform some additional installation steps, these are described in: /usr/share/doc/mailman-2.1.15/INSTALL.REDHAT


Security Fix(es):
libxml2: Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.(CVE-2016-5131)
libxml2: A use-after-free flaw was found in the libxml2 library. An attacker could use this flaw to cause an application linked against libxml2 to crash when parsing a specially crafted XML file.(CVE-2017-15412)
libxml2: A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application.(CVE-2018-14404)
libxml2: 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.(CVE-2018-14567)
libxml2: The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.(CVE-2017-18258)
libxml2: A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to crash.(CVE-2015-8035)
libxml2: bugfix
mailman: An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.(CVE-2018-13796)
mailman: A cross-site scripting vulnerability (XSS) has been discovered in mailman due to the host_name field not being properly validated. A malicious list owner could use this flaw to create a specially crafted list and inject client-side scripts.(CVE-2018-0618)
mailman: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F9B3.

影响组件

  • libxml2
  • mailman

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["libxml2-2.9.1-6.el7.4.x86_64.rpm","libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm","libxml2-devel-2.9.1-6.el7.4.x86_64.rpm","libxml2-python-2.9.1-6.el7.4.x86_64.rpm","libxml2-static-2.9.1-6.el7.4.x86_64.rpm"],"source":"libxml2-2.9.1-6.el7.4.src.rpm"},{"binary":["mailman-2.1.15-30.el7.x86_64.rpm","mailman-debuginfo-2.1.15-30.el7.x86_64.rpm"],"source":"mailman-2.1.15-30.el7.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["libxml2-2.9.1-6.el7.4.x86_64.rpm","libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm","libxml2-devel-2.9.1-6.el7.4.x86_64.rpm","libxml2-python-2.9.1-6.el7.4.x86_64.rpm","libxml2-static-2.9.1-6.el7.4.x86_64.rpm"],"source":"libxml2-2.9.1-6.el7.4.src.rpm"},{"binary":["mailman-2.1.15-30.el7.x86_64.rpm","mailman-debuginfo-2.1.15-30.el7.x86_64.rpm"],"source":"mailman-2.1.15-30.el7.src.rpm"}]}]}

CVE

参考