[SECURITY] Fedora 16 Update: libxml2-2.7.8-8.fc16

updates at fedoraproject.org updates at fedoraproject.org
Thu Sep 27 04:35:19 UTC 2012


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-13824
2012-09-12 00:05:24
--------------------------------------------------------------------------------

Name        : libxml2
Product     : Fedora 16
Version     : 2.7.8
Release     : 8.fc16
URL         : http://xmlsoft.org/
Summary     : Library providing XML and HTML support
Description :
This library allows to manipulate XML files. It includes support
to read, modify and write XML and HTML files. There is DTDs support
this includes parsing and validation even with complex DtDs, either
at parse time or later once the document has been modified. The output
can be a simple SAX stream or and in-memory DOM like representations.
In this case one can use the built-in XPath and XPointer implementation
to select subnodes or ranges. A flexible Input/Output mechanism is
available, with existing HTTP and FTP modules and combined to an
URI library.

--------------------------------------------------------------------------------
Update Information:

lot of security bug fixes
Lots of security patches
--------------------------------------------------------------------------------
ChangeLog:

* Tue Sep 11 2012 Daniel Veillard <veillard at redhat.com> - 2.7.8-8
- previous build broken due to failure to use the versioning script
  rebuilding with automake and autoconf
* Mon Sep 10 2012 Daniel Veillard <veillard at redhat.com> - 2.7.8-7
- Fixes for CVE-2011-3919 CVE-2011-3905 CVE-2011-2834 (rhbz#772122)
- Fixes for CVE-2012-2807 (843743)
- Fixes for CVE-2012-0841 (795698)
- Fix for CVE-2011-1944 (709750)
- Fix for CVE-2011-0216 (755813)
- Fix for CVE-2011-2821 (735715)
- Fix for CVE-2011-3102 (822171)
- Fix some potential problems on reallocation failures
- Hardening of XPath evaluation
- Fix an off by one error in encoding
- Fix missing error status in XPath evaluation
- Make sure the parser returns when getting a Stop order
- Fix an allocation error when copying entities
- Add hash randomization to hash and dict structures
- Force randomization of dict and hash
- Fix a failure to report xmlreader parsing failures
- Fix parser local buffers size problems
- Fix entities local buffers size problems
- Fix an error in previous commit
- Do not fetch external parsed entities
- Impose a reasonable limit on attribute size
- Impose a reasonable limit on comment size
- Impose a reasonable limit on PI size
- Cleanups and new limit APIs for dictionaries
- Introduce some default parser limits
- Implement some default limits in the XPath module
- Fixup limits parser
- Enforce XML_PARSER_EOF state handling through the parser
- Avoid quadratic behaviour in some push parsing cases
- More avoid quadratic behaviour
- Strengthen behaviour of the push parser in problematic situations
- More fixups on the push parser behaviour
- Fix a segfault on XSD validation on pattern error
- Fix an unimplemented part in RNG value validation
- Fix an off by one pointer access
- Change the XPath code to percolate allocation errors
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #772122 - CVE-2011-3919 CVE-2011-3905 CVE-2011-2834 libxml2 various flaws [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=772122
  [ 2 ] Bug #843743 - CVE-2012-2807 libxml2 (64-bit): Multiple integer overflows, leading to DoS or possibly other unspecified impact [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=843743
  [ 3 ] Bug #709750 - CVE-2011-1944 libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=709750
  [ 4 ] Bug #735715 - CVE-2011-2821 libxml2: double free caused by malformed XPath expression in XSLT [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=735715
  [ 5 ] Bug #822171 - CVE-2011-3102 libxml: An off-by-one out-of-bounds write by XPointer part evaluation [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=822171
  [ 6 ] Bug #755813 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=755813
  [ 7 ] Bug #795698 - CVE-2012-0841 libxml2: hash table collisions CPU usage DoS [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=795698
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update libxml2' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list