MGASA-2019-0047 - Updated libxml2 packages fix security vulnerabilities

Publication date: 23 Jan 2019
URL: https://advisories.mageia.org/MGASA-2019-0047.html
Type: security
Affected Mageia releases: 6
CVE: CVE-2018-9251,
     CVE-2018-14567,
     CVE-2018-14404

A flaw was found in libxml2 2.9.8. The xz_decomp function in xzlib.c, if
--with-lzma is used, allows remote attackers to cause a denial of service
(infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR,
as demonstrated by xmllint (CVE-2018-9251, CVE-2018-14567).

A null pointer dereference vulnerability exists in the
xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid
XPath expression. Applications processing untrusted XSL format inputs
with the use of libxml2 library may be vulnerable to denial of service
attack due to crash of the application (CVE-2018-14404).

The libxml2 package has been updated to version 2.9.9 to fix these
issues and other bugs.

The perl-XML-LibXML package has been rebuilt against the updated libxml2.

References:
- https://bugs.mageia.org/show_bug.cgi?id=23410
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/G5AFZARX7BUSU24J2MJ4AHX5OE47UXQA/
- https://ubuntu.com/security/notices/USN-3739-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9251
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404

SRPMS:
- 6/core/libxml2-2.9.9-1.mga6
- 6/core/perl-XML-LibXML-2.13.200-1.1.mga6

Mageia 2019-0047: libxml2 security update

A flaw was found in libxml2 2.9.8

Summary

A flaw was found in libxml2 2.9.8. The xz_decomp function in xzlib.c, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (CVE-2018-9251, CVE-2018-14567).
A null pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing invalid XPath expression. Applications processing untrusted XSL format inputs with the use of libxml2 library may be vulnerable to denial of service attack due to crash of the application (CVE-2018-14404).
The libxml2 package has been updated to version 2.9.9 to fix these issues and other bugs.
The perl-XML-LibXML package has been rebuilt against the updated libxml2.

References

- https://bugs.mageia.org/show_bug.cgi?id=23410

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/G5AFZARX7BUSU24J2MJ4AHX5OE47UXQA/

- https://ubuntu.com/security/notices/USN-3739-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9251

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404

Resolution

MGASA-2019-0047 - Updated libxml2 packages fix security vulnerabilities

SRPMS

- 6/core/libxml2-2.9.9-1.mga6

- 6/core/perl-XML-LibXML-2.13.200-1.1.mga6

Severity
Publication date: 23 Jan 2019
URL: https://advisories.mageia.org/MGASA-2019-0047.html
Type: security
CVE: CVE-2018-9251, CVE-2018-14567, CVE-2018-14404

Related News