安全公告详情

NS-SA-2026-0014

2026-03-04 16:02:51

简介

important: coreutils/qemu security update

严重级别

important

主题

An update for coreutils/qemu is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

coreutils:
qemu:


Security Fix(es):
coreutils: The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.(CVE-2015-4041)
coreutils: Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.(CVE-2015-4042)
coreutils: In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.(CVE-2017-18018)
coreutils: Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.(CVE-2017-7476)
coreutils: The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing.(CVE-2018-17942)
coreutils: bugfix
qemu: A flaw was found in QEMU's LSI53C895A device emulator. When executing LSI scripts, a crafted sequence of I/O requests may cause the emulator to enter into an infinite loop. This vulnerability could be executed locally and would affect the availability of the system.(CVE-2019-12068)
qemu: A use-after-free issue was found in the SLiRP networking implementation of the QEMU emulator. The issue occurs in ip_reass() routine while reassembling incoming packets, if the first fragment is bigger than the m->m_dat[] buffer. A user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service.(CVE-2019-15890)
qemu: An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.(CVE-2020-14364)
qemu: An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.(CVE-2020-1711)
qemu: A flaw was found in the USB redirector device emulation of QEMU. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.(CVE-2021-3682)
qemu: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.(CVE-2021-3713)
qemu: A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service.(CVE-2022-0216)
qemu: An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.(CVE-2022-3872)
qemu: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • coreutils
  • qemu

影响产品

  • CGSL MAIN 6.06 (SP)

更新包

{"fix":[{"product":"CGSL MAIN 6.06 (SP)","pkgs":[{"binary":["coreutils-8.30-12.zncgsl6.t1.0.x86_64.rpm","coreutils-common-8.30-12.zncgsl6.t1.0.x86_64.rpm"],"source":"coreutils-8.30-12.zncgsl6.t1.0.src.rpm"},{"binary":["qemu-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-curl-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-dmg-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-gluster-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-iscsi-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-rbd-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-block-ssh-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-common-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-img-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-kvm-4.1.0-2.zncgsl6.t3.0.x86_64.rpm","qemu-tools-4.1.0-2.zncgsl6.t3.0.x86_64.rpm"],"source":"qemu-4.1.0-2.zncgsl6.t3.0.src.rpm"}]}]}

CVE

参考