openSUSE Security Update: Security update for libxml2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2016:0106-1 Rating: moderate References: #928193 #951734 #951735 #954429 #956018 #956021 #956260 #957105 #957106 #957107 #957109 #957110 Cross-References: CVE-2015-1819 CVE-2015-5312 CVE-2015-7497 CVE-2015-7498 CVE-2015-7499 CVE-2015-7500 CVE-2015-7941 CVE-2015-7942 CVE-2015-8035 CVE-2015-8241 CVE-2015-8242 CVE-2015-8317 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 12 vulnerabilities is now available. Description: - security update: This update fixes the following security issues: * CVE-2015-1819 Enforce the reader to run in constant memory [bnc#928193] * CVE-2015-7941 Fix out of bound read with crafted xml input by stopping parsing on entities boundaries errors [bnc#951734] * CVE-2015-7942 Fix another variation of overflow in Conditional sections [bnc#951735] * CVE-2015-8241 Avoid extra processing of MarkupDecl when EOF [bnc#956018] * CVE-2015-8242 Buffer overead with HTML parser in push mode [bnc#956021] * CVE-2015-8317 Return if the encoding declaration is broken or encoding conversion failed [bnc#956260] * CVE-2015-5312 Fix another entity expansion issue [bnc#957105] * CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey [bnc#957106] * CVE-2015-7498 Processes entities after encoding conversion failures [bnc#957107] * CVE-2015-7499 Add xmlHaltParser() to stop the parser / Detect incoherency on GROW [bnc#957109] * CVE-2015-8317 Multiple out-of-bound read could lead to denial of service [bnc#956260] * CVE-2015-8035 DoS when parsing specially crafted XML document if XZ support is enabled [bnc#954429] * CVE-2015-7500 Fix memory access error due to incorrect entities boundaries [bnc#957110] This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2016-32=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): libxml2-2-2.9.1-10.1 libxml2-2-debuginfo-2.9.1-10.1 libxml2-debugsource-2.9.1-10.1 libxml2-devel-2.9.1-10.1 libxml2-tools-2.9.1-10.1 libxml2-tools-debuginfo-2.9.1-10.1 python-libxml2-2.9.1-10.1 python-libxml2-debuginfo-2.9.1-10.1 python-libxml2-debugsource-2.9.1-10.1 - openSUSE Leap 42.1 (x86_64): libxml2-2-32bit-2.9.1-10.1 libxml2-2-debuginfo-32bit-2.9.1-10.1 libxml2-devel-32bit-2.9.1-10.1 - openSUSE Leap 42.1 (noarch): libxml2-doc-2.9.1-10.1 References: https://www.suse.com/security/cve/CVE-2015-1819.html https://www.suse.com/security/cve/CVE-2015-5312.html https://www.suse.com/security/cve/CVE-2015-7497.html https://www.suse.com/security/cve/CVE-2015-7498.html https://www.suse.com/security/cve/CVE-2015-7499.html https://www.suse.com/security/cve/CVE-2015-7500.html https://www.suse.com/security/cve/CVE-2015-7941.html https://www.suse.com/security/cve/CVE-2015-7942.html https://www.suse.com/security/cve/CVE-2015-8035.html https://www.suse.com/security/cve/CVE-2015-8241.html https://www.suse.com/security/cve/CVE-2015-8242.html https://www.suse.com/security/cve/CVE-2015-8317.html https://bugzilla.suse.com/928193 https://bugzilla.suse.com/951734 https://bugzilla.suse.com/951735 https://bugzilla.suse.com/954429 https://bugzilla.suse.com/956018 https://bugzilla.suse.com/956021 https://bugzilla.suse.com/956260 https://bugzilla.suse.com/957105 https://bugzilla.suse.com/957106 https://bugzilla.suse.com/957107 https://bugzilla.suse.com/957109 https://bugzilla.suse.com/957110