CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
95.0%
Issue Overview:
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. (CVE-2018-14404)
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2017-15412)
A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to crash. (CVE-2015-8035)
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251. (CVE-2018-14567)
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. (CVE-2017-18258)
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. (CVE-2016-5131)
Affected Packages:
libxml2
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libxml2 to update your system.
New Packages:
aarch64:
libxml2-2.9.1-6.amzn2.4.1.aarch64
libxml2-devel-2.9.1-6.amzn2.4.1.aarch64
libxml2-static-2.9.1-6.amzn2.4.1.aarch64
libxml2-python-2.9.1-6.amzn2.4.1.aarch64
libxml2-debuginfo-2.9.1-6.amzn2.4.1.aarch64
i686:
libxml2-2.9.1-6.amzn2.4.1.i686
libxml2-devel-2.9.1-6.amzn2.4.1.i686
libxml2-static-2.9.1-6.amzn2.4.1.i686
libxml2-python-2.9.1-6.amzn2.4.1.i686
libxml2-debuginfo-2.9.1-6.amzn2.4.1.i686
src:
libxml2-2.9.1-6.amzn2.4.1.src
x86_64:
libxml2-2.9.1-6.amzn2.4.1.x86_64
libxml2-devel-2.9.1-6.amzn2.4.1.x86_64
libxml2-static-2.9.1-6.amzn2.4.1.x86_64
libxml2-python-2.9.1-6.amzn2.4.1.x86_64
libxml2-debuginfo-2.9.1-6.amzn2.4.1.x86_64
Red Hat: CVE-2015-8035, CVE-2016-5131, CVE-2017-15412, CVE-2017-18258, CVE-2018-14404, CVE-2018-14567
Mitre: CVE-2015-8035, CVE-2016-5131, CVE-2017-15412, CVE-2017-18258, CVE-2018-14404, CVE-2018-14567
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 2 | aarch64 | libxml2 | < 2.9.1-6.amzn2.4.1 | libxml2-2.9.1-6.amzn2.4.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | libxml2-devel | < 2.9.1-6.amzn2.4.1 | libxml2-devel-2.9.1-6.amzn2.4.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | libxml2-static | < 2.9.1-6.amzn2.4.1 | libxml2-static-2.9.1-6.amzn2.4.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | libxml2-python | < 2.9.1-6.amzn2.4.1 | libxml2-python-2.9.1-6.amzn2.4.1.aarch64.rpm |
Amazon Linux | 2 | aarch64 | libxml2-debuginfo | < 2.9.1-6.amzn2.4.1 | libxml2-debuginfo-2.9.1-6.amzn2.4.1.aarch64.rpm |
Amazon Linux | 2 | i686 | libxml2 | < 2.9.1-6.amzn2.4.1 | libxml2-2.9.1-6.amzn2.4.1.i686.rpm |
Amazon Linux | 2 | i686 | libxml2-devel | < 2.9.1-6.amzn2.4.1 | libxml2-devel-2.9.1-6.amzn2.4.1.i686.rpm |
Amazon Linux | 2 | i686 | libxml2-static | < 2.9.1-6.amzn2.4.1 | libxml2-static-2.9.1-6.amzn2.4.1.i686.rpm |
Amazon Linux | 2 | i686 | libxml2-python | < 2.9.1-6.amzn2.4.1 | libxml2-python-2.9.1-6.amzn2.4.1.i686.rpm |
Amazon Linux | 2 | i686 | libxml2-debuginfo | < 2.9.1-6.amzn2.4.1 | libxml2-debuginfo-2.9.1-6.amzn2.4.1.i686.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
95.0%