-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1575
             SUSE Security Update: Security update for libxml2
                              5 November 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libxml2
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-2877 CVE-2013-0339 CVE-2013-0338
                   CVE-2012-5134 CVE-2012-2807 CVE-2012-0841
                   CVE-2011-3919 CVE-2011-3102 

Reference:         ASB-2013.0083
                   ASB-2013.0057
                   ASB-2012.0164
                   ASB-2012.0096
                   ESB-2012.0217
                   ESB-2012.0202
                   ESB-2012.0201
                   ESB-2012.0145
                   ESB-2012.0088
                   ESB-2012.0053

Original Bulletin: 
   http://support.novell.com/security/cve/CVE-2011-3102.html
   http://support.novell.com/security/cve/CVE-2011-3919.html
   http://support.novell.com/security/cve/CVE-2012-0841.html
   http://support.novell.com/security/cve/CVE-2012-2807.html
   http://support.novell.com/security/cve/CVE-2012-5134.html
   http://support.novell.com/security/cve/CVE-2013-0338.html
   http://support.novell.com/security/cve/CVE-2013-0339.html
   http://support.novell.com/security/cve/CVE-2013-2877.html

Comment: This bulletin contains two (2) Novell security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

   SUSE Security Update: Security update for libxml2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1625-1
Rating:             important
References:         #739894 #748561 #764538 #769184 #793334 #805233 
                    #829077 
Cross-References:   CVE-2011-3102 CVE-2011-3919 CVE-2012-0841
                    CVE-2012-2807 CVE-2012-5134 CVE-2013-0338
                    CVE-2013-0339 CVE-2013-2877
Affected Products:
                    SUSE Linux Enterprise Server 10 SP3 LTSS
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:


   This is a LTSS rollup update for the libxml2 library that
   fixes various  security issues.

   CVE-2013-2877: parser.c in libxml2 allowed remote
   attackers to cause a denial of service (out-of-bounds read)
   via a document that ends abruptly, related to the lack of
   certain checks for the XML_PARSER_EOF state.

   CVE-2013-0338: libxml2 allowed context-dependent
   attackers to cause a denial of service (CPU and memory
   consumption) via an XML file containing an entity
   declaration with long replacement text and many references
   to this entity, aka "internal entity expansion" with linear
   complexity.

   CVE-2012-5134: Heap-based buffer underflow in the
   xmlParseAttValueComplex function in parser.c in libxml2
   allowed remote attackers to cause a denial of service or
   possibly execute arbitrary code via crafted entities in an
   XML document.

   CVE-2012-2807: Multiple integer overflows in libxml2
   on 64-bit Linux platforms allowed remote attackers to cause
   a denial of service or possibly have unspecified other
   impact via unknown vectors.

   CVE-2011-3102: Off-by-one error in libxml2 allowed
   remote attackers to cause a denial of service
   (out-of-bounds write) or possibly have unspecified other
   impact via unknown vectors.

   CVE-2012-0841: libxml2 computed hash values without
   restricting the ability to trigger hash collisions
   predictably, which allows context-dependent attackers to
   cause a denial of service (CPU consumption) via crafted XML
   data.

   CVE-2011-3919: A heap-based buffer overflow during
   decoding of entity references with overly long names has
   been fixed.

   Security Issue references:

   * CVE-2013-0338
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338>
   * CVE-2013-0339
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339>
   * CVE-2012-5134
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134>
   * CVE-2012-2807
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807>
   * CVE-2011-3102
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102>
   * CVE-2012-0841
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0841>
   * CVE-2011-3919
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919>
   * CVE-2013-2877
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877>

Package List:

   - SUSE Linux Enterprise Server 10 SP3 LTSS (i586 s390x x86_64):

      libxml2-2.6.23-15.39.1
      libxml2-devel-2.6.23-15.39.1
      libxml2-python-2.6.23-15.39.1

   - SUSE Linux Enterprise Server 10 SP3 LTSS (s390x x86_64):

      libxml2-32bit-2.6.23-15.39.1
      libxml2-devel-32bit-2.6.23-15.39.1

References:

   http://support.novell.com/security/cve/CVE-2011-3102.html
   http://support.novell.com/security/cve/CVE-2011-3919.html
   http://support.novell.com/security/cve/CVE-2012-0841.html
   http://support.novell.com/security/cve/CVE-2012-2807.html
   http://support.novell.com/security/cve/CVE-2012-5134.html
   http://support.novell.com/security/cve/CVE-2013-0338.html
   http://support.novell.com/security/cve/CVE-2013-0339.html
   http://support.novell.com/security/cve/CVE-2013-2877.html
   https://bugzilla.novell.com/739894
   https://bugzilla.novell.com/748561
   https://bugzilla.novell.com/764538
   https://bugzilla.novell.com/769184
   https://bugzilla.novell.com/793334
   https://bugzilla.novell.com/805233
   https://bugzilla.novell.com/829077
   http://download.novell.com/patch/finder/?keywords=a3fdb1e2e30b1877238605841d41d573

- -------------------------------------------------------------------------------

   SUSE Security Update: Security update for libxml2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1627-1
Rating:             important
References:         #829077 
Cross-References:   CVE-2011-3102 CVE-2011-3919 CVE-2012-0841
                    CVE-2012-2807 CVE-2012-5134 CVE-2013-0338
                    CVE-2013-0339 CVE-2013-2877
Affected Products:
                    SUSE Linux Enterprise Server 10 SP4 LTSS
______________________________________________________________________________

   An update that fixes 8 vulnerabilities is now available.

Description:


   libxml2 has been updated to fix the following security
   issue:

   * CVE-2013-0338: libxml2 allowed context-dependent
   attackers to cause a denial of service (CPU and memory
   consumption) via an XML file containing an entity
   declaration with long replacement text and many references
   to this entity, aka "internal entity expansion" with linear
   complexity.

   Security Issue references:

   * CVE-2013-0338
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338>
   * CVE-2013-0339
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339>
   * CVE-2012-5134
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134>
   * CVE-2012-2807
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807>
   * CVE-2011-3102
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102>
   * CVE-2012-0841
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0841>
   * CVE-2011-3919
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919>
   * CVE-2013-2877
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877>

Package List:

   - SUSE Linux Enterprise Server 10 SP4 LTSS (i586 s390x x86_64):

      libxml2-2.6.23-15.39.1
      libxml2-devel-2.6.23-15.39.1
      libxml2-python-2.6.23-15.39.1

   - SUSE Linux Enterprise Server 10 SP4 LTSS (s390x x86_64):

      libxml2-32bit-2.6.23-15.39.1
      libxml2-devel-32bit-2.6.23-15.39.1

References:

   http://support.novell.com/security/cve/CVE-2011-3102.html
   http://support.novell.com/security/cve/CVE-2011-3919.html
   http://support.novell.com/security/cve/CVE-2012-0841.html
   http://support.novell.com/security/cve/CVE-2012-2807.html
   http://support.novell.com/security/cve/CVE-2012-5134.html
   http://support.novell.com/security/cve/CVE-2013-0338.html
   http://support.novell.com/security/cve/CVE-2013-0339.html
   http://support.novell.com/security/cve/CVE-2013-2877.html
   https://bugzilla.novell.com/829077
   http://download.novell.com/patch/finder/?keywords=aeb05c467f847178dc94b70e3bc77cc8

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7RIz
-----END PGP SIGNATURE-----