The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) Red Hat would like to thank the GNOME project for reporting CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, and CVE-2015-8317. Upstream acknowledges Kostya Serebryany of Google as the original reporter of CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, and CVE-2015-7500; Hugh Davenport as the original reporter of CVE-2015-8241 and CVE-2015-8242; and Hanno Boeck as the original reporter of CVE-2015-8317. All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.
lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
marc.info/?l=bugtraq&m=145382616617563&w=2
rhn.redhat.com/errata/RHSA-2015-2549.html
rhn.redhat.com/errata/RHSA-2015-2550.html
rhn.redhat.com/errata/RHSA-2016-1089.html
www.debian.org/security/2015/dsa-3430
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/bid/79509
www.securitytracker.com/id/1034243
www.ubuntu.com/usn/USN-2834-1
xmlsoft.org/news.html
access.redhat.com/errata/RHSA-2015:2549
access.redhat.com/errata/RHSA-2015:2550
access.redhat.com/errata/RHSA-2016:1089
access.redhat.com/security/cve/CVE-2015-7499
access.redhat.com/security/cve/CVE-2015-8710
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1281925
bugzilla.redhat.com/show_bug.cgi?id=1281955
git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
rhn.redhat.com/errata/RHSA-2015-2549.html
security.gentoo.org/glsa/201701-37
support.apple.com/HT206166
support.apple.com/HT206167
support.apple.com/HT206168
support.apple.com/HT206169