Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3102 libxml2 security update 10 September 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: libxml2 Publisher: Debian Operating System: Debian GNU/Linux 9 Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-24977 CVE-2020-7595 CVE-2019-20388 CVE-2019-19956 CVE-2018-14567 CVE-2018-14404 CVE-2017-18258 CVE-2017-8872 Reference: ESB-2020.2475 ESB-2020.1826 ESB-2020.1479 ESB-2020.1145 Original Bulletin: https://lists.debian.org/debian-lts-announce/2020/09/msg00000.html - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2369-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Markus Koschany September 09, 2020 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : libxml2 Version : 2.9.4+dfsg1-2.2+deb9u3 CVE ID : CVE-2017-8872 CVE-2017-18258 CVE-2018-14404 CVE-2018-14567 CVE-2019-19956 CVE-2019-20388 CVE-2020-7595 CVE-2020-24977 Debian Bug : 895245 862450 949583 969529 949582 Several security vulnerabilities were corrected in libxml2, the GNOME XML library. CVE-2017-8872 Global buffer-overflow in the htmlParseTryOrFinish function. CVE-2017-18258 The xz_head function in libxml2 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. CVE-2018-14404 A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs may be vulnerable to a denial of service attack. CVE-2018-14567 If the option --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file. CVE-2019-19956 The xmlParseBalancedChunkMemoryRecover function has a memory leak related to newDoc->oldNs. CVE-2019-20388 A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service. CVE-2020-7595 Infinite loop in xmlStringLenDecodeEntities can cause a denial of service. CVE-2020-24977 Out-of-bounds read restricted to xmllint --htmlout. For Debian 9 stretch, these problems have been fixed in version 2.9.4+dfsg1-2.2+deb9u3. We recommend that you upgrade your libxml2 packages. For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAl9ZWi1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeRxRQ/+NeFhVvWFiqIJ+jXEIHP6wV8eS6MMEcSreOxF68nzcNQzXXdJBYigPZra BR2Zb4z5Ut7UhnCySEVii3B+N+6qnq/mGhHINW9nSih2BmpcRe81N/QOUjoDuXY7 I/MqvyEXAdrrpKBeVDPu/r4ZPupjGhZJGEe2DAkNCB/Gx2dxuB1wbmu3Bii0bi8h 31LeYsaIYsdxFs0VevJvVWB8FukSL4fM3FLvOaiTkPwnKLQUyeDmAtGoPmXVI3DA t1OvnYCUItFi97zKANAz5wx/W04qxoPnQP+usnQH6x16a4QxtzbxN8bkj6oywFv9 9ZMBAcc+IPVW1C4SCk6CTNtT/GpxSN8f2vGhBeI+IYRmFLL/nulTiZI15u6bEG5e aktGROyiuRANaxEIZEbhKv6zGcXzuBZOT4MbSf4y4OC7w6no4NKj6ZvZWpMEChZ5 05aOsTZICYMIqd+tuE9cfj/5bKXd078dBJ4O+3RBu5LLPWi3yVG4+bLukm6uG7y4 MFgMY2dMp1aV9nRgYa50GJZHps5ZsLn/qu4hgITlP1shY6kEHgV99Eh5RNLpwbBV sCnOiLF242eqhxqbhuDvE0j2Ci5rkC05ZPouD8E/KptU4WfcmQP0k6N7DRNylUZv RBoYf69Soagkn7QRDBMPGfRb0DUUPT/HuCxBdDGTy8ReofDM1ck= =P6Ab - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX1mTbeNLKJtyKPYoAQiNdhAAo/MjDj+vllQ9ctwLUVqiO3kiwlTXO9bz MWEkK7U2eXwtIGeg0k/vaic38rjNxtezt6cfCc5itBMHaUcXBpSziyqhR/lETCYx vDFZd/xitnwIC1DOLgbZhSrBCqb7Wb//5RXDTCUPtcc+Xm8dGVVEMxBnafCW+bdz QzTm4MrmH9ytWfBLWYaEEUU/mM86QXvK8LhJltgzdRsFynlxyBbXRxqIN1wJp+h3 SG82CvFrbKCxjIR0nONJThELgb7H2mP61gKW6eQg27uDCGrdW07IovV1C7SQLGU6 qDsmibUzj6BsmWIIqugmT3CtkClRbxIvW7UM1yFKAPbUhYfeAWAZ6T/7oY/PNtvL gQB+zB3ONl4MjRGq5iKsjYL1Cb4FR7ecmtL3bUPNcUZiDOOT91bGOlm74v4DZqZO c5m3MAfSMYWDzFLvWJMCM5b/bnEFPlg7wELxFyqhAjhKjN+IcPa7IbLUW8rfcEau 14lBfgYa9KHDY25a4o6T6khSEgiaMzHQ2nSQrXv/IwZM2LCgc922+/Gqb1xkvvAC 2k/E78tP2mbge2QEBBY9I91aTF19Mqcpsn3zkAEbj1ZH3H4p7OJ0QjrxwIVsY81x I9A1KiPP9zBQCLx9POzaphhmHdDzojDaImsyAaSCqZFXWw3OoqgEPO2xjWC9lo4E MDRICe2Z7qU= =5XAZ -----END PGP SIGNATURE-----