<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libxml2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0446-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-10T21:24:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-10T21:24:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-10T21:24:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libxml2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libxml2 fixes the following issues:

* CVE-2016-4658: use-after-free error could lead to crash [bsc#1005544]
* Fix NULL dereference in xpointer.c when in recovery mode [bsc#1014873]
* CVE-2016-9597: An XML document with many opening tags could have caused a overflow of the stack not detected by the recursion limits, allowing for DoS (bsc#1017497).

For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files
and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930).

This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0446-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2.9.4-3.1">
      <FullProductName ProductID="libxml2-2.9.4-3.1">libxml2-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-2.9.4-3.1">
      <FullProductName ProductID="libxml2-2-2.9.4-3.1">libxml2-2-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-32bit-2.9.4-3.1">
      <FullProductName ProductID="libxml2-2-32bit-2.9.4-3.1">libxml2-2-32bit-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-2.9.4-3.1">
      <FullProductName ProductID="libxml2-devel-2.9.4-3.1">libxml2-devel-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-32bit-2.9.4-3.1">
      <FullProductName ProductID="libxml2-devel-32bit-2.9.4-3.1">libxml2-devel-32bit-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-doc-2.9.4-3.1">
      <FullProductName ProductID="libxml2-doc-2.9.4-3.1">libxml2-doc-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-tools-2.9.4-3.1">
      <FullProductName ProductID="libxml2-tools-2.9.4-3.1">libxml2-tools-2.9.4-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python-libxml2-2.9.4-3.1">
      <FullProductName ProductID="python-libxml2-2.9.4-3.1">python-libxml2-2.9.4-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libxml2-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-2.9.4-3.1">libxml2-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-2-2.9.4-3.1">libxml2-2-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-32bit-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-2-32bit-2.9.4-3.1">libxml2-2-32bit-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-devel-2.9.4-3.1">libxml2-devel-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-32bit-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-devel-32bit-2.9.4-3.1">libxml2-devel-32bit-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-doc-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-doc-2.9.4-3.1">libxml2-doc-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libxml2-tools-2.9.4-3.1">libxml2-tools-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python-libxml2-2.9.4-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:python-libxml2-2.9.4-3.1">python-libxml2-2.9.4-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.</Note>
    </Notes>
    <CVE>CVE-2016-4658</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libxml2-2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-doc-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-tools-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:python-libxml2-2.9.4-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4658.html</URL>
        <Description>CVE-2016-4658</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005544</URL>
        <Description>SUSE Bug 1005544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1069433</URL>
        <Description>SUSE Bug 1069433</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1078813</URL>
        <Description>SUSE Bug 1078813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.</Note>
    </Notes>
    <CVE>CVE-2016-9318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libxml2-2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-doc-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-tools-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:python-libxml2-2.9.4-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9318.html</URL>
        <Description>CVE-2016-9318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010675</URL>
        <Description>SUSE Bug 1010675</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1013930</URL>
        <Description>SUSE Bug 1013930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1019074</URL>
        <Description>SUSE Bug 1019074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118959</URL>
        <Description>SUSE Bug 1118959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1126613</URL>
        <Description>SUSE Bug 1126613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1148896</URL>
        <Description>SUSE Bug 1148896</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.</Note>
    </Notes>
    <CVE>CVE-2016-9597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.2:libxml2-2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-devel-32bit-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-doc-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:libxml2-tools-2.9.4-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:python-libxml2-2.9.4-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-02/msg00055.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9597.html</URL>
        <Description>CVE-2016-9597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1014873</URL>
        <Description>SUSE Bug 1014873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1017497</URL>
        <Description>SUSE Bug 1017497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123919</URL>
        <Description>SUSE Bug 1123919</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
