Skip to navigation

Security Advisory Important: libxml2 security update

Advisory: RHSA-2012:0016-1
Type: Security Advisory
Severity: Important
Issued on: 2012-01-11
Last updated on: 2012-01-11
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2011-0216
CVE-2011-2834
CVE-2011-3905
CVE-2011-3919

Details

Updated libxml2 packages that fix several security issues are now available
for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The libxml2 library is a development toolbox providing the implementation
of various XML standards. One of those standards is the XML Path Language
(XPath), which is a language for addressing parts of an XML document.

A heap-based buffer overflow flaw was found in the way libxml2 decoded
entity references with long names. A remote attacker could provide a
specially-crafted XML file that, when opened in an application linked
against libxml2, would cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2011-3919)

An off-by-one error, leading to a heap-based buffer overflow, was found in
the way libxml2 parsed certain XML files. A remote attacker could provide a
specially-crafted XML file that, when opened in an application linked
against libxml2, would cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
application. (CVE-2011-0216)

A flaw was found in the way libxml2 parsed certain XPath expressions. If an
attacker were able to supply a specially-crafted XML file to an application
using libxml2, as well as an XPath expression for that application to run
against the crafted file, it could cause the application to crash.
(CVE-2011-2834)

Note: Red Hat does not ship any applications that use libxml2 in a way that
would allow the CVE-2011-2834 flaw to be exploited; however, third-party
applications may allow XPath expressions to be passed which could trigger
this flaw.

An out-of-bounds memory read flaw was found in libxml2. A remote attacker
could provide a specially-crafted XML file that, when opened in an
application linked against libxml2, would cause the application to crash.
(CVE-2011-3905)

All users of libxml2 are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. The desktop must
be restarted (log out, then log back in) for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
libxml2-2.6.16-12.9.src.rpm     MD5: 1269745adb1ec3ece3c06bb718a2fa0e
SHA-256: a9f3eb1e4a99c1d131a3fc81a58b8c69e76ac484e682c24f3d0c9b78398c3ae5
 
IA-32:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-devel-2.6.16-12.9.i386.rpm     MD5: d3c9542d8d2b2d3e89075b292400f44b
SHA-256: b39001a065ac8ae43bc1281880b418d2a7d0c4244904d81413b67a50b725c574
libxml2-python-2.6.16-12.9.i386.rpm     MD5: 9187842c747a4632d2f0cfc76eb7e5a1
SHA-256: aaa48f5238909136f4be0d24d08c0c4642dda85bbfa8d5cbccac482e153fb840
 
x86_64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.x86_64.rpm     MD5: 7d268cca8b05dd67d0bfb7c687b26291
SHA-256: 09c844583e520232b5c4fa3de5a38a6b8c9a8c1d79cf0dcd602434e856715258
libxml2-devel-2.6.16-12.9.x86_64.rpm     MD5: 8a61331effb4b013efb485bc85b2db4a
SHA-256: d11b9e9c7a321ad712cbe857cab344c168dc22ba8ee6a06c368a1a0ac52c186e
libxml2-python-2.6.16-12.9.x86_64.rpm     MD5: fed161ecec8abacd7d0ef6a7766b59fd
SHA-256: d1c68795bc28ba101938ca7b7e165fd34e9f0b747cd803105a7c9353e962c8d4
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
libxml2-2.6.16-12.9.src.rpm     MD5: 1269745adb1ec3ece3c06bb718a2fa0e
SHA-256: a9f3eb1e4a99c1d131a3fc81a58b8c69e76ac484e682c24f3d0c9b78398c3ae5
 
IA-32:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-devel-2.6.16-12.9.i386.rpm     MD5: d3c9542d8d2b2d3e89075b292400f44b
SHA-256: b39001a065ac8ae43bc1281880b418d2a7d0c4244904d81413b67a50b725c574
libxml2-python-2.6.16-12.9.i386.rpm     MD5: 9187842c747a4632d2f0cfc76eb7e5a1
SHA-256: aaa48f5238909136f4be0d24d08c0c4642dda85bbfa8d5cbccac482e153fb840
 
IA-64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.ia64.rpm     MD5: 14ce3447f57937fcc7385b24949e4cb3
SHA-256: 6e0bcfd3087bfc988c0cafee5386131bb308b128510ae918734e34ef3b9aab65
libxml2-devel-2.6.16-12.9.ia64.rpm     MD5: 53a958f7daef11b7ecfe2eeadd99eb1d
SHA-256: 91b4ab948c2f721b6b4db3717d1a3b8965392cd487dafd88f9c835e8b15e6189
libxml2-python-2.6.16-12.9.ia64.rpm     MD5: c1be7b68832dc40708320d6b88e58ee7
SHA-256: 82fe8aa87297de346fca3aa2d5db020dd8341b9e8a872ae79e85c635faab9bb9
 
PPC:
libxml2-2.6.16-12.9.ppc.rpm     MD5: 1044904ea79893d47008a2f287fb9bf3
SHA-256: 3fc6ac25f95a149e0548f130977bcac24f88fa9c8df08daa8a34d1fe7ab1a55c
libxml2-2.6.16-12.9.ppc64.rpm     MD5: 526f3cc8b49ebdcc3ff1ef7058225694
SHA-256: 7ae97e53a362c1b2530b14f00a2e781f9b3b76aef3cf668826829edefa4cdf80
libxml2-devel-2.6.16-12.9.ppc.rpm     MD5: 4f1d180764ad9d9b6fbfbe5d8caf9a50
SHA-256: 65c10543adf758d4b429b4b1d1b0f034501629ee9b48a0133ccf6423a6e4d0f0
libxml2-python-2.6.16-12.9.ppc.rpm     MD5: ebe146281c5ca0fa454856c3227d094a
SHA-256: 9ea40e47a1792bbd89191ad0426dd6d5aa96a393d56ee15b5ed4d1764ac49b2b
 
s390:
libxml2-2.6.16-12.9.s390.rpm     MD5: a92722cd7752e51c91ba9e88d8346ca3
SHA-256: c0b0cf6057ad7461cba4380d4dae3335022ecea0ce044ca370b46dc936b956e2
libxml2-devel-2.6.16-12.9.s390.rpm     MD5: 1d868f0eb94a3ea4d2ded6f832cdbeab
SHA-256: 67134ba78ed4de93febd4951ba65151de3f8b5b3ef9813d5014cedb4273aaa66
libxml2-python-2.6.16-12.9.s390.rpm     MD5: 4dfd244b0252d6fa830b807ecaa56110
SHA-256: 1a64c5bc43b5d88691456799ade16404247543ae374cfa5b4a60e423f945ab9a
 
s390x:
libxml2-2.6.16-12.9.s390.rpm     MD5: a92722cd7752e51c91ba9e88d8346ca3
SHA-256: c0b0cf6057ad7461cba4380d4dae3335022ecea0ce044ca370b46dc936b956e2
libxml2-2.6.16-12.9.s390x.rpm     MD5: 24a09bd6d508bdcfbfacf1a26132ad86
SHA-256: d07e2e50ff145a5709bd361fcdf3c174774088476198fc946bf26db55f97c4c0
libxml2-devel-2.6.16-12.9.s390x.rpm     MD5: a217300c63d2afe1ecc072c48408f30a
SHA-256: faa06cbbf847260767078199dff71127af7657ce4d3db90079d40e37a878c984
libxml2-python-2.6.16-12.9.s390x.rpm     MD5: dbc3c3a1e212833bdfba2a78b0cee182
SHA-256: 95bd0644f0370c4765fbb68c83d90b6a855aef70c7b990b201b87ad1bbd059b8
 
x86_64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.x86_64.rpm     MD5: 7d268cca8b05dd67d0bfb7c687b26291
SHA-256: 09c844583e520232b5c4fa3de5a38a6b8c9a8c1d79cf0dcd602434e856715258
libxml2-devel-2.6.16-12.9.x86_64.rpm     MD5: 8a61331effb4b013efb485bc85b2db4a
SHA-256: d11b9e9c7a321ad712cbe857cab344c168dc22ba8ee6a06c368a1a0ac52c186e
libxml2-python-2.6.16-12.9.x86_64.rpm     MD5: fed161ecec8abacd7d0ef6a7766b59fd
SHA-256: d1c68795bc28ba101938ca7b7e165fd34e9f0b747cd803105a7c9353e962c8d4
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
libxml2-2.6.16-12.9.src.rpm     MD5: 1269745adb1ec3ece3c06bb718a2fa0e
SHA-256: a9f3eb1e4a99c1d131a3fc81a58b8c69e76ac484e682c24f3d0c9b78398c3ae5
 
IA-32:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-devel-2.6.16-12.9.i386.rpm     MD5: d3c9542d8d2b2d3e89075b292400f44b
SHA-256: b39001a065ac8ae43bc1281880b418d2a7d0c4244904d81413b67a50b725c574
libxml2-python-2.6.16-12.9.i386.rpm     MD5: 9187842c747a4632d2f0cfc76eb7e5a1
SHA-256: aaa48f5238909136f4be0d24d08c0c4642dda85bbfa8d5cbccac482e153fb840
 
IA-64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.ia64.rpm     MD5: 14ce3447f57937fcc7385b24949e4cb3
SHA-256: 6e0bcfd3087bfc988c0cafee5386131bb308b128510ae918734e34ef3b9aab65
libxml2-devel-2.6.16-12.9.ia64.rpm     MD5: 53a958f7daef11b7ecfe2eeadd99eb1d
SHA-256: 91b4ab948c2f721b6b4db3717d1a3b8965392cd487dafd88f9c835e8b15e6189
libxml2-python-2.6.16-12.9.ia64.rpm     MD5: c1be7b68832dc40708320d6b88e58ee7
SHA-256: 82fe8aa87297de346fca3aa2d5db020dd8341b9e8a872ae79e85c635faab9bb9
 
x86_64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.x86_64.rpm     MD5: 7d268cca8b05dd67d0bfb7c687b26291
SHA-256: 09c844583e520232b5c4fa3de5a38a6b8c9a8c1d79cf0dcd602434e856715258
libxml2-devel-2.6.16-12.9.x86_64.rpm     MD5: 8a61331effb4b013efb485bc85b2db4a
SHA-256: d11b9e9c7a321ad712cbe857cab344c168dc22ba8ee6a06c368a1a0ac52c186e
libxml2-python-2.6.16-12.9.x86_64.rpm     MD5: fed161ecec8abacd7d0ef6a7766b59fd
SHA-256: d1c68795bc28ba101938ca7b7e165fd34e9f0b747cd803105a7c9353e962c8d4
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
libxml2-2.6.16-12.9.src.rpm     MD5: 1269745adb1ec3ece3c06bb718a2fa0e
SHA-256: a9f3eb1e4a99c1d131a3fc81a58b8c69e76ac484e682c24f3d0c9b78398c3ae5
 
IA-32:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-devel-2.6.16-12.9.i386.rpm     MD5: d3c9542d8d2b2d3e89075b292400f44b
SHA-256: b39001a065ac8ae43bc1281880b418d2a7d0c4244904d81413b67a50b725c574
libxml2-python-2.6.16-12.9.i386.rpm     MD5: 9187842c747a4632d2f0cfc76eb7e5a1
SHA-256: aaa48f5238909136f4be0d24d08c0c4642dda85bbfa8d5cbccac482e153fb840
 
IA-64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.ia64.rpm     MD5: 14ce3447f57937fcc7385b24949e4cb3
SHA-256: 6e0bcfd3087bfc988c0cafee5386131bb308b128510ae918734e34ef3b9aab65
libxml2-devel-2.6.16-12.9.ia64.rpm     MD5: 53a958f7daef11b7ecfe2eeadd99eb1d
SHA-256: 91b4ab948c2f721b6b4db3717d1a3b8965392cd487dafd88f9c835e8b15e6189
libxml2-python-2.6.16-12.9.ia64.rpm     MD5: c1be7b68832dc40708320d6b88e58ee7
SHA-256: 82fe8aa87297de346fca3aa2d5db020dd8341b9e8a872ae79e85c635faab9bb9
 
x86_64:
libxml2-2.6.16-12.9.i386.rpm     MD5: 25dffa52915fe2255a96aafe1bf95962
SHA-256: 513ab88c1cc051eb780e94122170f41c473b5609c622deea0a05244279212dbd
libxml2-2.6.16-12.9.x86_64.rpm     MD5: 7d268cca8b05dd67d0bfb7c687b26291
SHA-256: 09c844583e520232b5c4fa3de5a38a6b8c9a8c1d79cf0dcd602434e856715258
libxml2-devel-2.6.16-12.9.x86_64.rpm     MD5: 8a61331effb4b013efb485bc85b2db4a
SHA-256: d11b9e9c7a321ad712cbe857cab344c168dc22ba8ee6a06c368a1a0ac52c186e
libxml2-python-2.6.16-12.9.x86_64.rpm     MD5: fed161ecec8abacd7d0ef6a7766b59fd
SHA-256: d1c68795bc28ba101938ca7b7e165fd34e9f0b747cd803105a7c9353e962c8d4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding
735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT
767387 - CVE-2011-3905 libxml2 out of bounds read
771896 - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/