安全公告详情

NS-SA-2023-0004

2023-02-20 16:21:31

简介

important: zlib/qemu security update

严重级别

important

主题

An update for zlib/qemu is now available for NewStart CGSL MAIN 6.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

zlib: Zlib is a general-purpose, patent-free, lossless data compression library which is used by many different programs.
qemu: This package provides debug information for package qemu. Debug information is useful when developing applications that use this package or when debugging this package.


Security Fix(es):
zlib: An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.(CVE-2018-25032)
zlib: bugfix
qemu: A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.(CVE-2022-0216)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.02.C0B6.

影响组件

  • zlib
  • qemu

影响产品

  • CGSL MAIN 6.02

更新包

{"fix":[{"product":"CGSL MAIN 6.02","pkgs":[{"binary":["zlib-1.2.11-18.el8_5.x86_64.rpm","zlib-devel-1.2.11-18.el8_5.x86_64.rpm"],"source":"zlib-1.2.11-18.el8_5.src.rpm"},{"binary":["qemu-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm","qemu-block-rbd-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm","qemu-common-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm","qemu-img-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm","qemu-kvm-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm","qemu-tools-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.x86_64.rpm"],"source":"qemu-4.1.0-2.el8.cgslv6_2.257.g8cbbfaa3d.src.rpm"}]}]}

CVE

参考