ALT-BU-2019-4044-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2018-00015
Уязвимость библиотеки для анализа XML-файлов libxml2, связанная с некорректным вычислением размера буфера для значения порта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-00016
Уязвимость функции xmlDictComputeFastKey (dict.c) библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00017
Уязвимость функции xmlDictAddString (dict.c) библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00518
Уязвимость функции xpath.c:xmlXPathCompOpEval() библиотеки libxml2, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00734
Уязвимость функции xz_decomp библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04730
Уязвимость библиотеки libxml2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04513
Уязвимость компонента parser.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03125
Уязвимость библиотеки libxml2 операционных систем iPhoneOS, tvOS, watchOS, macOS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-03356
Уязвимость функции xz_head компонента xzlib.c библиотеки Libxml2, связанная с недостатком механизма распределения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05256
Уязвимость компонента xmlmemory.c программного обеспечения для анализа XML-документов libxml2, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07417
Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07418
Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00218
Уязвимость библиотеки Libxml2, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-4658
xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
- APPLE-SA-2016-09-20
- APPLE-SA-2016-09-20
- APPLE-SA-2016-09-20-3
- APPLE-SA-2016-09-20-3
- APPLE-SA-2016-09-20-5
- APPLE-SA-2016-09-20-5
- APPLE-SA-2016-09-20-6
- APPLE-SA-2016-09-20-6
- 93054
- 93054
- 1036858
- 1036858
- 1038623
- 1038623
- https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
- https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
- GLSA-201701-37
- GLSA-201701-37
- https://support.apple.com/HT207141
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- https://support.apple.com/HT207142
- https://support.apple.com/HT207143
- https://support.apple.com/HT207143
- https://support.apple.com/HT207170
- https://support.apple.com/HT207170
Modified: 2024-11-21
CVE-2017-15412
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- 1040348
- 1040348
- RHSA-2017:3401
- RHSA-2017:3401
- RHSA-2018:0287
- RHSA-2018:0287
- https://bugzilla.gnome.org/show_bug.cgi?id=783160
- https://bugzilla.gnome.org/show_bug.cgi?id=783160
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://crbug.com/727039
- https://crbug.com/727039
- [debian-lts-announce] 20171218 [SECURITY] [DLA 1211-1] libxml2 security update
- [debian-lts-announce] 20171218 [SECURITY] [DLA 1211-1] libxml2 security update
- GLSA-201801-03
- GLSA-201801-03
- DSA-4086
- DSA-4086
Modified: 2024-11-21
CVE-2017-18258
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
- https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
- https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- https://security.netapp.com/advisory/ntap-20190719-0001/
- https://security.netapp.com/advisory/ntap-20190719-0001/
- USN-3739-1
- USN-3739-1
Modified: 2024-11-21
CVE-2017-5130
An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.
- http://bugzilla.gnome.org/show_bug.cgi?id=783026
- http://bugzilla.gnome.org/show_bug.cgi?id=783026
- 101482
- 101482
- RHSA-2017:2997
- RHSA-2017:2997
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://crbug.com/722079
- https://crbug.com/722079
- https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
- https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
- [debian-lts-announce] 20171123 [SECURITY] [DLA 1188-1] libxml2 security update
- [debian-lts-announce] 20171123 [SECURITY] [DLA 1188-1] libxml2 security update
- [debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update
- [debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update
- GLSA-201710-24
- GLSA-201710-24
- https://security.netapp.com/advisory/ntap-20190719-0001/
- https://security.netapp.com/advisory/ntap-20190719-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2017-5969
libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.
- [oss-security] 20161105 CVE request: Null pointer derefence parsing xml file using libxml 2.9.4 (in recover mode)
- [oss-security] 20161105 CVE request: Null pointer derefence parsing xml file using libxml 2.9.4 (in recover mode)
- [oss-security] 20170213 CVE-2017-5969: Null pointer derefence parsing xml file using libxml 2.9.4 (in recover mode)
- [oss-security] 20170213 CVE-2017-5969: Null pointer derefence parsing xml file using libxml 2.9.4 (in recover mode)
- 96188
- 96188
- https://bugzilla.gnome.org/show_bug.cgi?id=778519
- https://bugzilla.gnome.org/show_bug.cgi?id=778519
- [debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update
- [debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update
- GLSA-201711-01
- GLSA-201711-01
Modified: 2024-11-21
CVE-2017-7376
Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.
- 98877
- 98877
- 1038623
- 1038623
- https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
- https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
- https://bugzilla.redhat.com/show_bug.cgi?id=1462216
- https://bugzilla.redhat.com/show_bug.cgi?id=1462216
- https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
- https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
- https://source.android.com/security/bulletin/2017-06-01
- https://source.android.com/security/bulletin/2017-06-01
- DSA-3952
- DSA-3952
Modified: 2024-11-21
CVE-2017-9047
A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
- DSA-3952
- DSA-3952
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- 98599
- 98599
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201711-01
- GLSA-201711-01
Modified: 2024-11-21
CVE-2017-9048
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
- DSA-3952
- DSA-3952
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- 98556
- 98556
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201711-01
- GLSA-201711-01
Modified: 2024-11-21
CVE-2017-9049
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
- DSA-3952
- DSA-3952
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- 98601
- 98601
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201711-01
- GLSA-201711-01
Modified: 2024-11-21
CVE-2017-9050
libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.
- DSA-3952
- DSA-3952
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- http://www.openwall.com/lists/oss-security/2017/05/15/1
- 98568
- 98568
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- GLSA-201711-01
- GLSA-201711-01
Modified: 2024-11-21
CVE-2018-14404
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
- RHSA-2019:1543
- RHSA-2019:1543
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817
- https://bugzilla.redhat.com/show_bug.cgi?id=1595985
- https://bugzilla.redhat.com/show_bug.cgi?id=1595985
- https://gitlab.gnome.org/GNOME/libxml2/issues/10
- https://gitlab.gnome.org/GNOME/libxml2/issues/10
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- https://security.netapp.com/advisory/ntap-20190719-0002/
- https://security.netapp.com/advisory/ntap-20190719-0002/
- USN-3739-1
- USN-3739-1
- USN-3739-2
- USN-3739-2
Modified: 2024-11-21
CVE-2018-14567
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
- 105198
- https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- USN-3739-1
- 105198
- USN-3739-1
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20180927 [SECURITY] [DLA 1524-1] libxml2 security update
- https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
Modified: 2024-11-21
CVE-2018-9251
The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.
Modified: 2024-11-21
CVE-2019-19956
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0781
- openSUSE-SU-2020:0781
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- [debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update
- [debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-0c71c00af4
- FEDORA-2020-0c71c00af4
- FEDORA-2020-7694e8be73
- FEDORA-2020-7694e8be73
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- USN-4274-1
- USN-4274-1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Package man-pages-ru updated to version 5.03-alt1 for branch p9 in task 240168.
Closed bugs
[FR] 5.03+