Updated libxml2 packages fix security vulnerabilities
Publication date: 19 May 2021Modification date: 19 May 2021
Type: security
Affected Mageia releases : 7 , 8
CVE: CVE-2021-3516 , CVE-2021-3517 , CVE-2021-3518 , CVE-2021-3537
Description
The updated packages fix security vulnerabilities: Use-after-free in xmlEncodeEntitiesInternal() in entities.c. (CVE-2021-3516) Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c. (CVE-2021-3517) Use-after-free in xmlXIncludeDoProcess() in xinclude.c. (CVE-2021-3518) NULL pointer dereference in valid.c in xmlValidBuildAContentModel. (CVE-2021-3537)
References
- https://bugs.mageia.org/show_bug.cgi?id=28902
- https://www.debian.org/lts/security/2021/dla-2653
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
SRPMS
7/core
- libxml2-2.9.9-2.6.mga7
8/core
- libxml2-2.9.10-7.1.mga8