Change logs for libxml2 source package in Trusty

  • libxml2 (2.9.1+dfsg1-3ubuntu4.13) trusty-security; urgency=medium
    
      * SECURITY UPDATE: XXE attacks
        - debian/patches/CVE-2016-9318.patch: fix in parser.c.
        - CVE-2016-9318
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2017-18258.patch: fix in xzlib.c.
        - CVE-2017-18258
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2018-14404.patch: fix in xpath.c.
        - CVE-2018-14404
      * SECURITY UPDATE: Infinite loop in LZMA decompression
        - debian/patches/CVE-2018-14567.patch: fix in xzlib.c.
        - CVE-2018-14567
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 13 Aug 2018 17:50:43 -0300
  • libxml2 (2.9.1+dfsg1-3ubuntu4.12) trusty-security; urgency=medium
    
      * SECURITY UPDATE: use after-free in xmlXPathCompOpEvalPositionPredicate
        - debian/patches/CVE-2017-15412.patch: fix XPath stack frame logic in
          xpath.c.
        - CVE-2017-15412
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 11 Dec 2017 13:31:53 -0300
  • libxml2 (2.9.1+dfsg1-3ubuntu4.11) trusty-security; urgency=medium
    
      * SECURITY UPDATE: infinite recursion in parameter entities
        - CVE-2017-16932
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 04 Dec 2017 15:17:15 -0300
  • libxml2 (2.9.1+dfsg1-3ubuntu4.10) trusty-security; urgency=medium
    
      * SECURITY UPDATE: type confusion leading to out-of-bounds write
        - debian/patches/CVE-2017-0663.patch: eliminate cast
        - CVE-2017-0663
      * SECURITY UPDATE: XML external entity (XXE) vulnerability
        - debian/patches/CVE-2017-7375.patch: add validation for parsed
          entity references
        - CVE-2017-7375
      * SECURITY UPDATE: buffer overflow in URL handling
        - debian/patches/CVE-2017-7376.patch: allocate enough memory for
          ports in HTTP redirect support
        - CVE-2017-7376
      * SECURITY UPDATE: buffer overflows in xmlSnprintfElementContent()
        - debian/patches/CVE-2017-9047-9048.patch: ensure enough space
          remains in buffer for copied data
        - CVE-2017-9047, CVE-2017-9048
      * SECURITY UPDATE: heap based buffer overreads in
        xmlDictComputeFastKey()
        - debian/patches/CVE-2017-9049-9050.patch: drop uneccessary
          expansions, add additional sanity check
        - CVE-2017-9049, CVE-2017-9050
    
     -- Steve Beattie <email address hidden>  Fri, 15 Sep 2017 16:19:46 -0700
  • libxml2 (2.9.1+dfsg1-3ubuntu4.9) trusty-security; urgency=medium
    
      * SECURITY UPDATE: format string vulnerabilities
        - debian/patches/CVE-2016-4448-1.patch: fix format string warnings in
          HTMLparser.c, SAX2.c, catalog.c, configure.in, debugXML.c,
          encoding.c, entities.c, error.c, include/libxml/parserInternals.h,
          include/libxml/xmlerror.h, include/libxml/xmlstring.h, libxml.h,
          parser.c, parserInternals.c, relaxng.c, schematron.c, testModule.c,
          valid.c, xinclude.c, xmlIO.c, xmllint.c, xmlreader.c, xmlschemas.c,
          xmlstring.c, xmlwriter.c, xpath.c, xpointer.c.
        - debian/patches/CVE-2016-4448-2.patch: fix format string warnings in
          libxml.h, relaxng.c, xmlschemas.c, xmlstring.c.
        - debian/patches/CVE-2016-4448-3.patch: fix build on pre-C99 compilers
          in relaxng.c, xmlschemas.c.
        - debian/libxml2.symbols: added new symbol.
        - CVE-2016-4448
      * SECURITY UPDATE: use-after-free via namespace nodes in XPointer ranges
        - debian/patches/CVE-2016-4658.patch: disallow namespace nodes in
          XPointer ranges in xpointer.c.
        - CVE-2016-4658
      * SECURITY UPDATE: use-after-free in XPointer range-to function
        - debian/patches/CVE-2016-5131-1.patch: fix XPointer paths beginning
          with range-to in xpath.c, xpointer.c.
        - debian/patches/CVE-2016-5131-2.patch: fix comparison with root node
          in xmlXPathCmpNodes in xpath.c.
        - CVE-2016-5131
    
     -- Marc Deslauriers <email address hidden>  Wed, 15 Mar 2017 07:54:26 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4.8) trusty-security; urgency=medium
    
      * SECURITY UPDATE: heap-based buffer overread in xmlNextChar
        - debian/patches/CVE-2016-1762.patch: return after error in parser.c.
        - CVE-2016-1762
      * SECURITY UPDATE: heap-based buffer overread in htmlCurrentChar
        - debian/patches/CVE-2016-1833-pre.patch: clear up NULL deref in
          parserInternals.c.
        - debian/patches/CVE-2016-1833-pre2.patch: handle 0-length entities in
          parserInternals.c.
        - debian/patches/CVE-2016-1833.patch: fix tests in parserInternals.c.
        - CVE-2016-1833
      * SECURITY UPDATE: heap-buffer-overflow in xmlStrncat
        - debian/patches/CVE-2016-1834.patch: check for negative lengths in
          xmlstring.c.
        - CVE-2016-1834
      * SECURITY UPDATE: heap use-after-free in xmlSAX2AttributeNs
        - debian/patches/CVE-2016-1835.patch: add check to parser.c, add tests
          to result/errors/759020.xml.err, result/errors/759020.xml.str,
          test/errors/759020.xml.
        - CVE-2016-1835
      * SECURITY UPDATE: heap use-after-free in xmlDictComputeFastKey
        - debian/patches/CVE-2016-1836.patch: prevent stale pointer usage in
          parser.c, added tests to result/errors/759398.xml.err,
          result/errors/759398.xml.str, test/errors/759398.xml.
        - CVE-2016-1836
      * SECURITY UPDATE: heap use-after-free in htmlParsePubidLiteral and
        htmlParseSystemiteral
        - debian/patches/CVE-2016-1837.patch: prevent stable pointer usage in
          HTMLparser.c.
        - CVE-2016-1837
      * SECURITY UPDATE: heap-based buffer overread in
        xmlParserPrintFileContextInternal
        - debian/patches/CVE-2016-1838.patch: add bounds check to parser.c,
          add tests to result/errors/758588.xml.err,
          result/errors/758588.xml.str, test/errors/758588.xml.
        - CVE-2016-1838
      * SECURITY UPDATE: heap-based buffer overread in xmlDictAddString
        - debian/patches/CVE-2016-1839.patch: add bounds check to HTMLparser.c.
        - CVE-2015-8806
        - CVE-2016-1839
        - CVE-2016-2073
      * SECURITY UPDATE: heap-buffer-overflow in xmlFAParsePosCharGroup
        - debian/patches/CVE-2016-1840.patch: properly handle error in
          xmlregexp.c.
        - CVE-2016-1840
      * SECURITY UPDATE: avoid building recursive entities
        - debian/patches/CVE-2016-3627.patch: properly handle recursion in
          parser.c, tree.c.
        - CVE-2016-3627
      * SECURITY UPDATE: recursion depth counter issue
        - debian/patches/CVE-2016-3705.patch: properly could recursion depth in
          parser.c.
        - CVE-2016-3705
      * SECURITY UPDATE: heap-based buffer-underreads due to xmlParseName
        - debian/patches/CVE-2016-4447.patch: improve error handling in
          parser.c.
        - CVE-2016-4447
      * SECURITY UPDATE: inappropriate fetch of entities content
        - debian/patches/CVE-2016-4449.patch: fix another external entity fetch
          in parser.c.
        - CVE-2016-4449
      * SECURITY UPDATE: out of bound access when serializing malformed strings
        - debian/patches/CVE-2016-4483.patch: improve string handling in
          xmlsave.c.
        - CVE-2016-4483
    
     -- Marc Deslauriers <email address hidden>  Fri, 03 Jun 2016 08:59:55 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4.7) trusty-security; urgency=medium
    
      * SECURITY UPDATE: incomplete fix for out of bounds read in xmlGROW
        (LP: #1525996)
        - add extra commits to this previously-fixed CVE
        - debian/patches/CVE-2015-7499-3.patch: reuse xmlHaltParser() where it
          makes sense in parser.c.
        - debian/patches/CVE-2015-7499-4.patch: do not print error context when
          there is none in error.c.
        - CVE-2015-7499
      * SECURITY UPDATE: out of bounds memory access via unclosed html comment
        - debian/patches/CVE-2015-8710.patch: fix parsing short unclosed
          comment uninitialized access in HTMLparser.c.
        - CVE-2015-8710
    
     -- Marc Deslauriers <email address hidden>  Thu, 14 Jan 2016 13:13:10 -0500
  • libxml2 (2.9.1+dfsg1-3ubuntu4.6) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via entity expansion issue
        - debian/patches/CVE-2015-5312.patch: properly exit when entity
          expansion is detected in parser.c.
        - CVE-2015-5312
      * SECURITY UPDATE: heap buffer overflow in xmlDictComputeFastQKey
        - debian/patches/CVE-2015-7497.patch: check offset in dict.c.
        - CVE-2015-7497
      * SECURITY UPDATE: denial of service via encoding conversion failures
        - debian/patches/CVE-2015-7498.patch: avoid processing entities after
          encoding conversion failures in parser.c.
        - CVE-2015-7498
      * SECURITY UPDATE: out of bounds read in xmlGROW
        - debian/patches/CVE-2015-7499-1.patch: add xmlHaltParser() to stop the
          parser in parser.c.
        - debian/patches/CVE-2015-7499-2.patch: check input in parser.c.
        - CVE-2015-7499
      * SECURITY UPDATE: out of bounds read in xmlParseMisc
        - debian/patches/CVE-2015-7500.patch: check entity boundaries in
          parser.c.
        - CVE-2015-7500
      * SECURITY UPDATE: denial of service via extra processing of MarkupDecl
        - debian/patches/CVE-2015-8241.patch: add extra EOF check in parser.c.
        - CVE-2015-8241
      * SECURITY UPDATE: buffer overead with HTML parser in push mode
        - debian/patches/CVE-2015-8242.patch: use pointer in the input in
          HTMLparser.c.
        - CVE-2015-8242
      * SECURITY UPDATE: denial of service via encoding failures
        - debian/patches/CVE-2015-8317-1.patch: do not process encoding values
          if the declaration is broken in parser.c.
        - debian/patches/CVE-2015-8317-2.patch: fail parsing if the encoding
          conversion failed in parser.c.
        - CVE-2015-8317
    
     -- Marc Deslauriers <email address hidden>  Wed, 09 Dec 2015 12:00:30 -0500
  • libxml2 (2.9.1+dfsg1-3ubuntu4.5) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via XEE attack
        - debian/patches/CVE-2015-1819.patch: enforce the reader to run in
          constant memory in buf.c, include/libxml/tree.h, xmlreader.c.
        - CVE-2015-1819
      * SECURITY UPDATE: denial of service via out-of-bounds read
        - debian/patches/CVE-2015-7941.patch: stop parsing on entities
          boundaries errors in parser.c.
        - CVE-2015-7941
      * SECURITY UPDATE: overflow in conditional sections
        - debian/patches/CVE-2015-7942.patch: properly check input in parser.c.
        - CVE-2015-7942
      * SECURITY UPDATE: denial of service via crafted document with xz
        - debian/patches/CVE-2015-8035.patch: check for error in xzlib.c.
        - CVE-2015-8035
    
     -- Marc Deslauriers <email address hidden>  Fri, 13 Nov 2015 08:58:16 -0500
  • libxml2 (2.9.1+dfsg1-3ubuntu4.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via entity expansion
        - debian/patches/CVE-2014-3660.patch: added additional tests to
          parser.c.
        - CVE-2014-3660
     -- Marc Deslauriers <email address hidden>   Thu, 16 Oct 2014 15:30:49 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4.3) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: more xmllint regressions (LP: #1321869)
        - debian/patches/lp1321869.patch: use upstream commit which includes
          additional regression fixes to parser.c.
     -- Marc Deslauriers <email address hidden>   Fri, 13 Jun 2014 08:33:28 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4.2) trusty-security; urgency=medium
    
      * SECURITY REGRESSION: xmllint no longer loads entities with --postvalid
        (LP: #1321869)
        - debian/patches/lp1321869.patch: also check XML_PARSE_DTDLOAD in
          parser.c.
     -- Marc Deslauriers <email address hidden>   Fri, 06 Jun 2014 13:29:08 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: resource exhaustion via external parameter entities
        - debian/patches/CVE-2014-0191.patch: do not fetch external parameter
          entities in parser.c.
        - CVE-2014-0191
     -- Marc Deslauriers <email address hidden>   Thu, 08 May 2014 14:28:19 -0400
  • libxml2 (2.9.1+dfsg1-3ubuntu4) trusty; urgency=medium
    
      * Rebuild to drop files installed into /usr/share/pyshared.
     -- Matthias Klose <email address hidden>   Sun, 23 Feb 2014 13:48:26 +0000
  • libxml2 (2.9.1+dfsg1-3ubuntu3) trusty; urgency=low
    
      * Actually run dh_autoreconf, which the old/new mixed rules file misses.
     -- Adam Conrad <email address hidden>   Sun, 08 Dec 2013 02:23:52 -0700
  • libxml2 (2.9.1+dfsg1-3ubuntu2) saucy; urgency=low
    
      [ Tim Galeckas ]
      * Fix SIGSEGV when --pretty is specified. LP: #923691
     -- Dmitrijs Ledkovs <email address hidden>   Thu, 22 Aug 2013 21:34:37 +0100