<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0043</id>
    <title>An update for libxml2 is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:01"/>
    <updated date="2023-01-05 02:56:01"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049" id="CVE-2017-9049" title="CVE-2017-9049 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2016-9318" id="CVE-2016-9318" title="CVE-2016-9318 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872" id="CVE-2017-8872" title="CVE-2017-8872 Base Score: 9.1 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048" id="CVE-2017-9048" title="CVE-2017-9048 Base Score: 7.5 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969" id="CVE-2017-5969" title="CVE-2017-5969 Base Score: 4.7 Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-7375" id="CVE-2017-7375" title="CVE-2017-7375 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541" id="CVE-2021-3541" title="CVE-2021-3541 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398. (CVE-2017-9049)

libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document. (CVE-2016-9318)

The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure. (CVE-2017-8872)

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 &lt; size. This vulnerability causes programs that use libxml2, such as PHP, to crash. (CVE-2017-9048)

** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.  NOTE: The maintainer states &quot;I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.&quot; (CVE-2017-5969)

A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable). (CVE-2017-7375)

A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service. (CVE-2021-3541)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="libxml2">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="libxml2" version="2.9.1" release="6.hce1c.9">
          <filename>libxml2-2.9.1-6.hce1c.9.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libxml2-devel" version="2.9.1" release="6.hce1c.9">
          <filename>libxml2-devel-2.9.1-6.hce1c.9.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libxml2-python" version="2.9.1" release="6.hce1c.9">
          <filename>libxml2-python-2.9.1-6.hce1c.9.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
