UbuntuUpdates.org

Package "python-libxml2"

Name: python-libxml2

Description:

Python bindings for the GNOME XML library

Latest version: 2.7.8.dfsg-5.1ubuntu4.22
Release: precise (12.04)
Level: security
Repository: main
Head package: libxml2
Homepage: http://xmlsoft.org/

Links


Download "python-libxml2"


Other versions of "python-libxml2" in Precise

Repository Area Version
base main 2.7.8.dfsg-5.1ubuntu4
updates main 2.7.8.dfsg-5.1ubuntu4.22

Changelog

Version: 2.7.8.dfsg-5.1ubuntu4.22 2021-05-03 14:07:16 UTC

  libxml2 (2.7.8.dfsg-5.1ubuntu4.22) precise-security; urgency=medium

  * SECURITY UPDATE: Memory leak
    - fix memory leak in xmlParseBalancedChunkMemoryRecover checking
      if doc is NULL in parser.c.
    - CVE-2019-19956
  * SECURITY UPDATE: Denial of service though an infinite loop
    - fix infinite loop in xmlStringLenDecodeEntities adding checks
      to ctxt->instate if it is == XML_PARSER_EOF in parser.c.
    - CVE-2020-7595

 -- <email address hidden> (Leonidas S. Barbosa) Wed, 05 Feb 2020 13:46:33 -0300

Source diff to previous version
CVE-2019-19956 xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
CVE-2020-7595 xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.

Version: 2.7.8.dfsg-5.1ubuntu4.17 2017-03-16 12:06:50 UTC

  libxml2 (2.7.8.dfsg-5.1ubuntu4.17) precise-security; urgency=medium

  * SECURITY UPDATE: format string vulnerabilities
    - fix format string warnings in HTMLparser.c, SAX2.c, catalog.c,
      configure, configure.in, debugXML.c, encoding.c, entities.c, error.c,
      include/libxml/parserInternals.h, include/libxml/xmlerror.h,
      include/libxml/xmlstring.h, libxml.h, parser.c, parserInternals.c,
      relaxng.c, schematron.c, testModule.c, valid.c, xinclude.c, xmlIO.c,
      xmllint.c, xmlreader.c, xmlschemas.c, xmlstring.c, xmlwriter.c,
      xpath.c, xpointer.c.
    - 4472c3a5a5b516aaf59b89be602fbce52756c3e9
    - 502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b
    - d77e5fc4bcdb7da748c9cca116a601ae4df60d21
    - debian/libxml2.symbols: added new symbol.
    - CVE-2016-4448
  * SECURITY UPDATE: use-after-free via namespace nodes in XPointer ranges
    - disallow namespace nodes in XPointer ranges in xpointer.c.
    - c1d1f7121194036608bf555f08d3062a36fd344b
    - CVE-2016-4658
  * SECURITY UPDATE: use-after-free in XPointer range-to function
    - fix XPointer paths beginning with range-to and fix comparison with
      root node in xmlXPathCmpNodesin xpath.c, xpointer.c.
    - 9ab01a277d71f54d3143c2cf333c5c2e9aaedd9e
    - a005199330b86dada19d162cae15ef9bdcb6baa8
    - CVE-2016-5131

 -- Marc Deslauriers <email address hidden> Wed, 15 Mar 2017 09:00:55 -0400

Source diff to previous version
CVE-2016-4448 Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.
CVE-2016-4658 libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a
CVE-2016-5131 Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of ser

Version: 2.7.8.dfsg-5.1ubuntu4.15 2016-06-06 18:06:25 UTC

  libxml2 (2.7.8.dfsg-5.1ubuntu4.15) precise-security; urgency=medium

  * SECURITY UPDATE: heap-based buffer overread in xmlNextChar
    - return after error in parser.c.
    - a7a94612aa3b16779e2c74e1fa353b5d9786c602
    - CVE-2016-1762
  * SECURITY UPDATE: heap-based buffer overread in htmlCurrentChar
    - clear up NULL deref, handle 0-length entities and fix tests in
      parserInternals.c.
    - ff76eb28c75451bc56e3b93f44dac155ca29e7f5
    - fdfeecc1b73b0318466f0d61f0b8881ed9d92dd2
    - 0bcd05c5cd83dec3406c8f68b769b1d610c72f76
    - CVE-2016-1833
  * SECURITY UPDATE: heap-buffer-overflow in xmlStrncat
    - check for negative lengths in xmlstring.c.
    - 8fbbf5513d609c1770b391b99e33314cd0742704
    - CVE-2016-1834
  * SECURITY UPDATE: heap use-after-free in xmlSAX2AttributeNs
    - add check to parser.c, add tests to result/errors/759020.xml.err,
      result/errors/759020.xml.str, test/errors/759020.xml.
    - 38eae571111db3b43ffdeb05487c9f60551906fb
    - CVE-2016-1835
  * SECURITY UPDATE: heap use-after-free in htmlParsePubidLiteral and
    htmlParseSystemiteral
    - prevent stable pointer usage in HTMLparser.c.
    - 11ed4a7a90d5ce156a18980a4ad4e53e77384852
    - CVE-2016-1837
  * SECURITY UPDATE: heap-based buffer overread in
    xmlParserPrintFileContextInternal
    - add bounds check to parser.c,
      add tests to result/errors/758588.xml.err,
      result/errors/758588.xml.str, test/errors/758588.xml.
    - db07dd613e461df93dde7902c6505629bf0734e9
    - CVE-2016-1838
  * SECURITY UPDATE: heap-based buffer overread in xmlDictAddString
    - add bounds check to HTMLparser.c.
    - a820dbeac29d330bae4be05d9ecd939ad6b4aa33
    - CVE-2015-8806
    - CVE-2016-1839
    - CVE-2016-2073
  * SECURITY UPDATE: heap-buffer-overflow in xmlFAParsePosCharGroup
    - properly handle error in xmlregexp.c.
    - cbb271655cadeb8dbb258a64701d9a3a0c4835b4
    - CVE-2016-1840
  * SECURITY UPDATE: avoid building recursive entities
    - properly handle recursion in parser.c, tree.c.
    - bdd66182ef53fe1f7209ab6535fda56366bd7ac9
    - CVE-2016-3627
  * SECURITY UPDATE: recursion depth counter issue
    - properly could recursion depth in parser.c.
    - 8f30bdff69edac9075f4663ce3b56b0c52d48ce6
    - CVE-2016-3705
  * SECURITY UPDATE: heap-based buffer-underreads due to xmlParseName
    - improve error handling in parser.c.
    - 00906759053986b8079985644172085f74331f83
    - CVE-2016-4447
  * SECURITY UPDATE: inappropriate fetch of entities content
    - fix another external entity fetch in parser.c.
    - b1d34de46a11323fccffa9fadeb33be670d602f5
    - CVE-2016-4449
  * SECURITY UPDATE: out of bound access when serializing malformed strings
    - improve string handling in xmlsave.c.
    - c97750d11bb8b6f3303e7131fe526a61ac65bcfd
    - CVE-2016-4483

 -- Marc Deslauriers <email address hidden> Fri, 03 Jun 2016 09:11:38 -0400

Source diff to previous version
CVE-2016-1762 libxml2 in Apple iOS before 9.3, OS X before 10.11.4, Safari before 9.1, tvOS before 9.2, and watchOS before 2.2 allows remote attackers to execute a
CVE-2016-1833 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2016-1834 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2016-1835 libxml2, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to execute arbitrary code or cause a denial of service (m
CVE-2016-1837 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2016-1838 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2015-8806 dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected characte
CVE-2016-1839 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2016-2073 The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML doc
CVE-2016-1840 libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbi
CVE-2016-3627 The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a d
CVE-2016-3705 The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth

Version: 2.7.8.dfsg-5.1ubuntu4.14 2016-01-19 22:06:30 UTC

  libxml2 (2.7.8.dfsg-5.1ubuntu4.14) precise-security; urgency=medium

  * SECURITY UPDATE: incomplete fix for out of bounds read in xmlGROW
    (LP: #1525996)
    - add extra commits to this previously-fixed CVE
    - parser.c: reuse xmlHaltParser() where it makes sense.
    - e3b1597421ad7cbeb5939fc3b54f43f141c82366
    - error.c: do not print error context when there is none.
    - ce0b0d0d81fdbb5f722a890432b52d363e4de57b
    - CVE-2015-7499
  * SECURITY UPDATE: out of bounds memory access via unclosed html comment
    - HTMLparser.c: fix parsing short unclosed comment uninitialized
      access.
    - e724879d964d774df9b7969fc846605aa1bac54c
    - CVE-2015-8710

 -- Marc Deslauriers Thu, 14 Jan 2016 13:16:09 -0500

Source diff to previous version
1525996 missing patch in USN-2834-1 security updates
CVE-2015-7499 Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process
CVE-2015-8710 out-of-bounds memory access when parsing an unclosed HTML comment

Version: 2.7.8.dfsg-5.1ubuntu4.13 2015-12-14 14:06:21 UTC

  libxml2 (2.7.8.dfsg-5.1ubuntu4.13) precise-security; urgency=medium

  * SECURITY UPDATE: denial of service via entity expansion issue
    - parser.c: properly exit when entity expansion is detected.
    - https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e
    - CVE-2015-5312
  * SECURITY UPDATE: heap buffer overflow in xmlDictComputeFastQKey
    - dict.c: check offset.
    - https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
    - CVE-2015-7497
  * SECURITY UPDATE: denial of service via encoding conversion failures
    - parser.c: avoid processing entities after encoding conversion
      failures.
    - https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43
    - CVE-2015-7498
  * SECURITY UPDATE: out of bounds read in xmlGROW
    - parser.c: add xmlHaltParser() to stop the parser and check input.
    - https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
    - https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
    - CVE-2015-7499
  * SECURITY UPDATE: out of bounds read in xmlParseMisc
    - parser.c: check entity boundaries.
    - https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f
    - CVE-2015-7500
  * SECURITY UPDATE: denial of service via extra processing of MarkupDecl
    - parser.c: add extra EOF check.
    - https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
    - CVE-2015-8241
  * SECURITY UPDATE: buffer overead with HTML parser in push mode
    - HTMLparser.c: use pointer in the input in.
    - https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
    - CVE-2015-8242
  * SECURITY UPDATE: denial of service via encoding failures
    - parser.c: do not process encoding values if the declaration is broken
      and fail parsing if the encoding conversion failed.
    - https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
    - https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
    - CVE-2015-8317

 -- Marc Deslauriers Wed, 09 Dec 2015 12:35:41 -0500

CVE-2015-5312 entity expansion issue
CVE-2015-7497 heap buffer overflow in xmlDictComputeFastQKey
CVE-2015-7498 processes entities after encoding conversion failures
CVE-2015-7500 memory access error due to incorrect entities boundaries
CVE-2015-8241 Buffer overread with XML parser in xmlNextChar
CVE-2015-8242 Buffer overread with HTML parser in push mode in xmlSAX2TextNode
CVE-2015-8317 issues in the xmlParseXMLDecl function



About   -   Send Feedback to @ubuntu_updates