安全公告详情

NS-SA-2024-0084

2023-12-29 09:45:14

简介

moderate: libxml2/qemu security update

严重级别

moderate

主题

An update for libxml2/qemu is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libxml2:
qemu:


Security Fix(es):
libxml2: A flaw was found in libxml2. This issue occurs when hashing empty strings which aren't null-terminated, xmlDictComputeFastKey could produce inconsistent results, which may lead to various logic or memory errors, including double free errors.(CVE-2023-29469)
libxml2: A flaw was found in libxml2. Parsing a XML document with the XML_PARSE_HUGE option enabled can result in an integer overflow because safety checks were missing in some functions. Also, the xmlParseEntityValue function didn't have any length limitation.(CVE-2022-40303)
libxml2: A flaw was found in libxml2. When a reference cycle is detected in the XML entity cleanup function the XML entity data can be stored in a dictionary. In this case, the dictionary becomes corrupted resulting in logic errors, including memory errors like double free.(CVE-2022-40304)
libxml2: A NULL pointer dereference vulnerability was found in libxml2. This issue occurs when parsing (invalid) XML schemas.(CVE-2023-28484)
libxml2: bugfix
qemu: A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ.(CVE-2023-3180)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.06B3.

影响组件

  • libxml2
  • qemu

影响产品

  • CGSL MAIN 6.06

更新包

{"fix":[{"product":"CGSL MAIN 6.06","pkgs":[{"binary":["libxml2-2.9.7-17.0.2.zncgsl6.x86_64.rpm","python3-libxml2-2.9.7-17.0.2.zncgsl6.x86_64.rpm"],"source":"libxml2-2.9.7-17.0.2.zncgsl6.src.rpm"},{"binary":["qemu-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-curl-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-dmg-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-gluster-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-iscsi-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-rbd-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-block-ssh-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-common-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-img-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-kvm-4.1.0-2.zncgsl6.t26.0.x86_64.rpm","qemu-tools-4.1.0-2.zncgsl6.t26.0.x86_64.rpm"],"source":"qemu-4.1.0-2.zncgsl6.t26.0.src.rpm"}]}]}
CGSL MAIN 6.06
  • libxml2-2.9.7-17.0.2.zncgsl6.src.rpm
    • libxml2-2.9.7-17.0.2.zncgsl6.x86_64.rpm
    • python3-libxml2-2.9.7-17.0.2.zncgsl6.x86_64.rpm
  • qemu-4.1.0-2.zncgsl6.t26.0.src.rpm
    • qemu-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-curl-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-dmg-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-gluster-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-iscsi-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-rbd-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-block-ssh-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-common-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-img-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-kvm-4.1.0-2.zncgsl6.t26.0.x86_64.rpm
    • qemu-tools-4.1.0-2.zncgsl6.t26.0.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108