安全公告详情

NS-SA-2025-0072

2025-05-28 09:42:09

简介

important: libxml2/qemu security update

严重级别

important

主题

An update for libxml2/qemu is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libxml2:
qemu:


Security Fix(es):
libxml2: A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.(CVE-2025-27113)
libxml2: bugfix
qemu: A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.(CVE-2023-6683)
qemu: A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.(CVE-2023-6693)
qemu: A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.(CVE-2024-3446)
qemu: A heap buffer overflow was found in the virtio-snd device in QEMU. When reading input audio in the virtio-snd input callback, virtio_snd_pcm_in_cb, the function did not check whether the iov can fit the data buffer. This issue can trigger an out-of-bounds write if the size of the virtio queue element is equal to virtio_snd_pcm_status, which makes the available space for audio data zero.(CVE-2024-7730)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.02B7.

影响组件

  • libxml2
  • qemu

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["libxml2-2.11.5-2.zncgsl7.4.x86_64.rpm","libxml2-devel-2.11.5-2.zncgsl7.4.x86_64.rpm","python3-libxml2-2.11.5-2.zncgsl7.4.x86_64.rpm"],"source":"libxml2-2.11.5-2.zncgsl7.4.src.rpm"},{"binary":["qemu-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-audio-alsa-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-audio-oss-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-audio-pa-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-audio-spice-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-curl-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-dmg-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-gluster-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-iscsi-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-rbd-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-block-ssh-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-char-baum-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-char-spice-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-common-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-display-qxl-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-display-virtio-gpu-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-display-virtio-gpu-pci-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-display-virtio-vga-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-display-virtio-vga-gl-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-usb-host-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-usb-redirect-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-device-usb-smartcard-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-docs-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-guest-agent-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-img-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-kvm-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-kvm-core-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-pr-helper-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-system-x86_64-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-system-x86_64-core-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-tools-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-curses-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-egl-headless-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-gtk-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-opengl-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-spice-app-8.2.0-14.zncgsl7.63.x86_64.rpm","qemu-ui-spice-core-8.2.0-14.zncgsl7.63.x86_64.rpm"],"source":"qemu-8.2.0-14.zncgsl7.63.src.rpm"}]}]}
CGSL MAIN 7.02
  • libxml2-2.11.5-2.zncgsl7.4.src.rpm
    • libxml2-2.11.5-2.zncgsl7.4.x86_64.rpm
    • libxml2-devel-2.11.5-2.zncgsl7.4.x86_64.rpm
    • python3-libxml2-2.11.5-2.zncgsl7.4.x86_64.rpm
  • qemu-8.2.0-14.zncgsl7.63.src.rpm
    • qemu-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-audio-alsa-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-audio-oss-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-audio-pa-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-audio-spice-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-curl-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-dmg-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-gluster-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-iscsi-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-rbd-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-block-ssh-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-char-baum-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-char-spice-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-common-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-display-qxl-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-display-virtio-gpu-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-display-virtio-gpu-pci-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-display-virtio-vga-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-display-virtio-vga-gl-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-usb-host-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-usb-redirect-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-device-usb-smartcard-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-docs-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-guest-agent-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-img-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-kvm-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-kvm-core-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-pr-helper-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-system-x86_64-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-system-x86_64-core-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-tools-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-curses-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-egl-headless-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-gtk-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-opengl-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-spice-app-8.2.0-14.zncgsl7.63.x86_64.rpm
    • qemu-ui-spice-core-8.2.0-14.zncgsl7.63.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108