安全公告详情

NS-SA-2025-0106

2025-07-25 16:49:52

简介

critical: libxml2/less security update

严重级别

critical

主题

An update for libxml2/less is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

libxml2:
less:


Security Fix(es):
libxml2: A flaw was found in libxml2. This vulnerability allows a NULL pointer dereference, leading to a potential crash or denial of service via a crafted XML pattern.(CVE-2025-27113)
libxml2: A flaw was found in libxml2. In an out-of-memory condition or when limiting the memory allocation, processing a XML document using the HTML parser may result in a use-after-free vulnerability.(CVE-2023-45322)
libxml2: A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.(CVE-2025-24928)
libxml2: A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.(CVE-2024-56171)
libxml2: A use-after-free flaw was found in libxml2. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.(CVE-2024-25062)
libxml2: A flaw was found in libxml2. In the affected versions of libxml2, the SAX parser can generate events for external entities, even if custom SAX handlers try to override entity content by setting it to "checked." This vulnerability allows classic  XML External Entity (XXE) attacks.(CVE-2024-40896)
libxml2: A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access via incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw, due to a mismatch between bytes and characters.(CVE-2025-32414)
libxml2: bugfix
less: An OS command injection flaw was found in Less. Since quoting is mishandled in filename.c, opening files with attacker-controlled file names can lead to OS command execution. Exploitation requires the LESSOPEN environment variable, which is set by default in many common cases.(CVE-2024-32487)
less: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.03B8.

影响组件

  • libxml2
  • less

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["python3-libxml2-2.11.5-2.zncgsl7.7.x86_64.rpm","libxml2-2.11.5-2.zncgsl7.7.x86_64.rpm","libxml2-devel-2.11.5-2.zncgsl7.7.x86_64.rpm"],"source":"libxml2-2.11.5-2.zncgsl7.7.src.rpm"},{"binary":["less-633-4.zncgsl7.1.x86_64.rpm"],"source":"less-633-4.zncgsl7.1.src.rpm"}]}]}

CVE

参考