Mageia 2021-0213: libxml2 security update
Summary
The updated packages fix security vulnerabilities:
Use-after-free in xmlEncodeEntitiesInternal() in entities.c.
(CVE-2021-3516)
Heap-based buffer overflow in xmlEncodeEntitiesInternal() in
entities.c. (CVE-2021-3517)
Use-after-free in xmlXIncludeDoProcess() in xinclude.c.
(CVE-2021-3518)
NULL pointer dereference in valid.c in xmlValidBuildAContentModel.
(CVE-2021-3537)
References
- https://bugs.mageia.org/show_bug.cgi?id=28902
- https://www.debian.org/lts/security/2021/dla-2653
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
Resolution
MGASA-2021-0213 - Updated libxml2 packages fix security vulnerabilities
SRPMS
- 8/core/libxml2-2.9.10-7.1.mga8
- 7/core/libxml2-2.9.9-2.6.mga7