libxml2-2.7.6-21.1.0.1.AXS4

エラータID: AXSA:2016-544:01

Release date: 
Monday, July 11, 2016 - 16:53
Subject: 
libxml2-2.7.6-21.1.0.1.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Description:

This library allows to manipulate XML files. It includes support
to read, modify and write XML and HTML files. There is DTDs support
this includes parsing and validation even with complex DtDs, either
at parse time or later once the document has been modified. The output
can be a simple SAX stream or and in-memory DOM like representations.
In this case one can use the built-in XPath and XPointer implementation
to select subnodes or ranges. A flexible Input/Output mechanism is
available, with existing HTTP and FTP modules and combined to an
URI library.

Security issues fixed with this release:

CVE-2016-1762
libxml2 in Apple iOS before 9.3, OS X before 10.11.4, Safari before
9.1, tvOS before 9.2, and watchOS before 2.2 allows remote attackers
to execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document.
CVE-2016-1833
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1834, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838,
CVE-2016-1839, and CVE-2016-1840.
CVE-2016-1834
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838,
CVE-2016-1839, and CVE-2016-1840.
CVE-2016-1835
libxml2, as used in Apple iOS before 9.3.2 and OS X before 10.11.5,
allows remote attackers to execute arbitrary code or cause a denial of
service (memory corruption) via a crafted XML document.
CVE-2016-1836
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1834, CVE-2016-1837, CVE-2016-1838,
CVE-2016-1839, and CVE-2016-1840.
CVE-2016-1837
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1838,
CVE-2016-1839, and CVE-2016-1840.
CVE-2016-1838
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1837,
CVE-2016-1839, and CVE-2016-1840.
CVE-2016-1839
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1837,
CVE-2016-1838, and CVE-2016-1840.
CVE-2016-1840
libxml2, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document, a different vulnerability than
CVE-2016-1833, CVE-2016-1834, CVE-2016-1836, CVE-2016-1837,
CVE-2016-1838, and CVE-2016-1839.
CVE-2016-3627
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and
earlier, when used in recovery mode, allows context-dependent
attackers to cause a denial of service (infinite recursion, stack
consumption, and application crash) via a crafted XML document.
CVE-2016-3705
The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions
in parser.c in libxml2 2.9.3 do not properly keep track of the
recursion depth, which allows context-dependent attackers to cause a
denial of service (stack consumption and application crash) via a
crafted XML document containing a large number of nested entity
references.
CVE-2016-4447
The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4
allows context-dependent attackers to cause a denial of service
(heap-based buffer underread and application crash) via a crafted
file, involving xmlParseName.
CVE-2016-4448
Format string vulnerability in libxml2 before 2.9.4 allows attackers
to have unspecified impact via format string specifiers in unknown
vectors.
CVE-2016-4449
XML external entity (XXE) vulnerability in the
xmlStringLenDecodeEntities function in parser.c in libxml2 before
2.9.4, when not in validating mode, allows context-dependent attackers
to read arbitrary files or cause a denial of service (resource
consumption) via unspecified vectors.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. libxml2-2.7.6-21.1.0.1.AXS4.src.rpm
    MD5: f92fe57fad0ca0759d04f350b1d862df
    SHA-256: 7790ca6faee4aec16e302bf63a5e93002b47488904269e36978f30360e725743
    Size: 4.72 MB

Asianux Server 4 for x86
  1. libxml2-2.7.6-21.1.0.1.AXS4.i686.rpm
    MD5: 9059bfa79f322e6d525dfb03b34ed2b8
    SHA-256: 15eb6654f8964d42f50e91021de810bfc266e8daaf3916ed511d84979fc674f5
    Size: 804.74 kB
  2. libxml2-devel-2.7.6-21.1.0.1.AXS4.i686.rpm
    MD5: bceb02e4f59c2fbcc3b5319d497535c4
    SHA-256: 482ba476b6bfddd2111aed158188082b57f3eee4c03d228c0c7fa888afb27070
    Size: 1.06 MB
  3. libxml2-python-2.7.6-21.1.0.1.AXS4.i686.rpm
    MD5: 9055c55af279a6b0b0fb9fc90b80d8ae
    SHA-256: 1ee469fde44f192e03b8e006c3fde19c0b3c17580a069c86d11f109506e46a41
    Size: 317.24 kB

Asianux Server 4 for x86_64
  1. libxml2-2.7.6-21.1.0.1.AXS4.x86_64.rpm
    MD5: 5e420ce758f52098d006ded4cf0b5379
    SHA-256: ba209bd1e59304d391b2504c6af56bf88c8ee024244e9852535b14e14cdf89b3
    Size: 804.30 kB
  2. libxml2-devel-2.7.6-21.1.0.1.AXS4.x86_64.rpm
    MD5: 6b950e80e13f334a47c1abd0232b5834
    SHA-256: 91c62352cbb0c4ab800a2579650c26d5cd44e0705d72b3fdaecfb789495e369b
    Size: 1.06 MB
  3. libxml2-python-2.7.6-21.1.0.1.AXS4.x86_64.rpm
    MD5: 6fdc37df691b5a86ac0c5421183d6364
    SHA-256: 770a948ee74da6d865e347c1988440b634d8f17b14cc99a980ddc3984998968b
    Size: 323.71 kB
  4. libxml2-2.7.6-21.1.0.1.AXS4.i686.rpm
    MD5: 9059bfa79f322e6d525dfb03b34ed2b8
    SHA-256: 15eb6654f8964d42f50e91021de810bfc266e8daaf3916ed511d84979fc674f5
    Size: 804.74 kB
  5. libxml2-devel-2.7.6-21.1.0.1.AXS4.i686.rpm
    MD5: bceb02e4f59c2fbcc3b5319d497535c4
    SHA-256: 482ba476b6bfddd2111aed158188082b57f3eee4c03d228c0c7fa888afb27070
    Size: 1.06 MB