|
|
Subscribe / Log in / New account

Mageia alert MGASA-2021-0213 (libxml2)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2021-0213: Updated libxml2 packages fix security vulnerabilities
Date:  Wed, 19 May 2021 21:32:17 +0200
Message-ID:  <20210519193217.E04DC9FD60@duvel.mageia.org>
Archive-link:  Article

MGASA-2021-0213 - Updated libxml2 packages fix security vulnerabilities Publication date: 19 May 2021 URL: https://advisories.mageia.org/MGASA-2021-0213.html Type: security Affected Mageia releases: 7, 8 CVE: CVE-2021-3516, CVE-2021-3517, CVE-2021-3518, CVE-2021-3537 Description: The updated packages fix security vulnerabilities: Use-after-free in xmlEncodeEntitiesInternal() in entities.c. (CVE-2021-3516) Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c. (CVE-2021-3517) Use-after-free in xmlXIncludeDoProcess() in xinclude.c. (CVE-2021-3518) NULL pointer dereference in valid.c in xmlValidBuildAContentModel. (CVE-2021-3537) References: - https://bugs.mageia.org/show_bug.cgi?id=28902 - https://www.debian.org/lts/security/2021/dla-2653 - https://lists.opensuse.org/archives/list/security-announc... - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537 SRPMS: - 8/core/libxml2-2.9.10-7.1.mga8 - 7/core/libxml2-2.9.9-2.6.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds