Amazon Linux 2 Security Advisory: ALAS-2020-1466
Advisory Release Date: 2020-07-21 16:34 Pacific
Advisory Updated Date: 2020-07-21 21:21 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application. (CVE-2018-14404)
Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (CVE-2017-15412)
A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to crash. (CVE-2015-8035)
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251. (CVE-2018-14567)
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. (CVE-2017-18258)
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. (CVE-2016-5131)
Affected Packages:
libxml2
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libxml2 to update your system.
aarch64:
libxml2-2.9.1-6.amzn2.4.1.aarch64
libxml2-devel-2.9.1-6.amzn2.4.1.aarch64
libxml2-static-2.9.1-6.amzn2.4.1.aarch64
libxml2-python-2.9.1-6.amzn2.4.1.aarch64
libxml2-debuginfo-2.9.1-6.amzn2.4.1.aarch64
i686:
libxml2-2.9.1-6.amzn2.4.1.i686
libxml2-devel-2.9.1-6.amzn2.4.1.i686
libxml2-static-2.9.1-6.amzn2.4.1.i686
libxml2-python-2.9.1-6.amzn2.4.1.i686
libxml2-debuginfo-2.9.1-6.amzn2.4.1.i686
src:
libxml2-2.9.1-6.amzn2.4.1.src
x86_64:
libxml2-2.9.1-6.amzn2.4.1.x86_64
libxml2-devel-2.9.1-6.amzn2.4.1.x86_64
libxml2-static-2.9.1-6.amzn2.4.1.x86_64
libxml2-python-2.9.1-6.amzn2.4.1.x86_64
libxml2-debuginfo-2.9.1-6.amzn2.4.1.x86_64