Updated libxml2 packages fix security vulnerability
Publication date: 03 Jan 2018Type: security
Affected Mageia releases : 6
CVE: CVE-2017-5130 , CVE-2017-15412 , CVE-2017-16932
Description
Integer overflow in memory debug code in libxml2 before 2.9.5 (CVE-2017-5130). It was discovered that libxml2 incorrecty handled certain files. An attacker could use this issue with specially constructed XML data to cause libxml2 to consume resources, leading to a denial of service (CVE-2017-15412). Wei Lei discovered that libxml2 incorrecty handled certain parameter entities. An attacker could use this issue with specially constructed XML data to cause libxml2 to consume resources, leading to a denial of service (CVE-2017-16932). The libxml2 package has been updated to version 2.9.7 to fix these issues and several other bugs. Also, the perl-XML-LibXML package has been updated to version 2.13.200 to allow it to be rebuilt against the updated libxml2.
References
- https://bugs.mageia.org/show_bug.cgi?id=22130
- https://chromereleases.googleblog.com/2017/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html
- https://usn.ubuntu.com/usn/usn-3513-1/
- https://usn.ubuntu.com/usn/usn-3504-1/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5130
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
SRPMS
6/core
- libxml2-2.9.7-1.mga6