Errata overview
Errata ID 488
Date 2017-12-14
Source package libxml2
Fixed in version 2.8.0+dfsg1-7.58.201712111940
Description
This update addresses the following issues:
* A remote code execution vulnerability in libxml2 could enable an attacker
  using a specially crafted file to execute arbitrary code within the
  context of an unprivileged process. This issue is rated as High due to
  the possibility of remote code execution in an application that uses this
  library (CVE-2017-0663)
* heap overflow in memory debug code (CVE-2017-5130)
* Missing validation for external entities in xmlParsePEReference
  (CVE-2017-7375)
* Incorrect limit used for port values (CVE-2017-7376)
* Denial of Service (application crash) due to buffer overflow in function
  xmlSnprintfElementContent in valid.c (CVE-2017-9047)
* Denial of Service (application crash) due to stack-based buffer overflow
  in the function xmlSnprintfElementContent in valid.c (CVE-2017-9048)
* Denial of Service (application crash) due to heap-based buffer over-read
  in the xmlDictComputeFastKey function in dict.c (CVE-2017-9049)
* Denial of Service (application crash) due to heap-based buffer over-read
  in the xmlDictAddString function in dict.c (CVE-2017-9050)
* parser.c mishandles parameter-entity references because the NEXTL macro
  calls the xmlParserHandlePEReference function in the case of a '%'
  character in a DTD name (CVE-2017-16931)
* parser.c does not prevent infinite recursion in parameter entities
  (CVE-2017-16932)
Additional notes
CVE ID CVE-2017-0663
CVE-2017-5130
CVE-2017-7375
CVE-2017-7376
CVE-2017-9047
CVE-2017-9048
CVE-2017-9049
CVE-2017-9050
CVE-2017-16931
CVE-2017-16932
UCS Bug number #44971