-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1578
                          libxml2 security update
                                11 May 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libxml2
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3537 CVE-2021-3518 CVE-2021-3517
                   CVE-2021-3516  

Reference:         ESB-2021.1547

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2653-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
May 10, 2021                                  https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : libxml2
Version        : 2.9.4+dfsg1-2.2+deb9u4
CVE ID         : CVE-2021-3516 CVE-2021-3517 CVE-2021-3518 CVE-2021-3537

Several vulnerabilities were discovered in libxml2, a library providing
support to read, modify and write XML and HTML files, which could cause
denial of service via application crash when parsing specially crafted
files.

For Debian 9 stretch, these problems have been fixed in version
2.9.4+dfsg1-2.2+deb9u4.

We recommend that you upgrade your libxml2 packages.

For the detailed security status of libxml2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libxml2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=yPqJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYJmlk+NLKJtyKPYoAQiSgQ//Y3z5FK5pqRDWqTauvJHJZWOBkUyx8/Cw
r3W1o8gv+oRREBm45izh1qd5pncI7LNIr4xll5z5V/MVOYT5oHL7k1+bY4LG2ily
VaBBHoJc5eUYUnnNLJYk6QrgflUDQCZEijc6fIqAWjjAa0RB6q5muh1rKKDmbAwy
VurkmGOLyvGhcEwNfyg7/1xelTiAOXkY3qZA/M+eEmmPWP9bC7TD3CefLKmI1BGK
68I5WMFb8hzULivFHlj/7UqncfQjiv7QSkQXcqmAikc1iFBsePh5VDlOfWkGJY1d
zDO+nkQOTgV+H6lLOXMFUyY9Z4DQqC431dgk8+RaOcM9RkV0IE3KsTEcjhM8Abyz
j7OPMp0T9r8RTaaJhwpNLjhSRm0vjVyi7Wyp+cf9mi1CrYh4TtGhK5qTquZXPpbJ
LkkLvXmHwASWQJ8NAX9rPFqZamJ9sIO7RVv8YrE1ImGY+7vMjWx5ExecxMfe3XOe
j/38cl24j01GjlgGmQRi81eeWhpr2TZcb+Hworbp/0vrTwlFG2HsRKiX7xFYSaXg
Oda16qNoRpcArLd00GttTEauR0xGz/TIHs/fVUeDpmTJs+WGY37ZO5zAyOyEzimm
5UWaApx1Tw6Kc9/vxF5ivkkc2Pc6ra22+mNen06DcFcpz4DqJclVOxixQVO17Fzq
W66og1k4N5A=
=VUCx
-----END PGP SIGNATURE-----