python-lxml-4.6.5-3.el9
エラータID: AXSA:2023-4609:01
lxml is an XML processing library providing access to libxml2 and libxslt libraries using the Python ElementTree API.
Security Fix(es):
* lxml: NULL Pointer Dereference in lxml (CVE-2022-2309)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.1 Release Notes linked from the References section.
CVE-2022-2309
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
Update packages.
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
N/A
SRPMS
- python-lxml-4.6.5-3.el9.src.rpm
MD5: 9e93dccaea58f844620cb57bc99fbaa4
SHA-256: 18181ec0fe97ebb9ef558a1f80954ddf970474d22ef0bf475c1249cb439790ca
Size: 3.07 MB
Asianux Server 9 for x86_64
- python3-lxml-4.6.5-3.el9.x86_64.rpm
MD5: b854791e8497a3e995136f075f2a7bcc
SHA-256: c562c4bdf32d418bba475ae38d6be4db287ee2accd191da36f1d5fd876c3b388
Size: 1.19 MB