UbuntuUpdates.org

Package "libxmltok"

Name: libxmltok

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • XML Parser Toolkit, developer libraries
  • XML Parser Toolkit, runtime libraries

Latest version: 1.2-4.1ubuntu3.1
Release: oracular (24.10)
Level: updates
Repository: universe

Links



Other versions of "libxmltok" in Oracular

Repository Area Version
base universe 1.2-4.1ubuntu3
security universe 1.2-4.1ubuntu3.1

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.2-4.1ubuntu3.1 2025-01-13 03:06:47 UTC

  libxmltok (1.2-4.1ubuntu3.1) oracular-security; urgency=medium

  * SECURITY UPDATE: integer overflow
    - xmlparse/xmlparse.c: add integer overflow checks and signed
      arthimetic
    - CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825,
    - CVE-2022-22826, CVE-2022-22827, CVE-2015-1283, CVE-2016-4472
  * SECURITY UPDATE: buffer overflow and integer overflow
    - xmlparse/xmlparse.c: assign a result for XmlConvert calls and verify
      if it matches with the expected XML_Convert_Result enum values.
      Add an integer overflow check and proper signed arithmetic
      overflow for blockSize in poolGrow().
    - xmltok/xmltok.c: add XML_Convert_Result return value for utf8_toUtf8,
      utf8_toUtf16, latin1_toUtf8, latin1_toUtf16, ascii_toUtf8, toUtf8,
      toUtf16, unknown_toUtf8 and unknown_toUtf16 methods.
    - xmltok/xmltok.h: add XML_Convert_Result enum values and return values
      for the above methods definitions.
    - xmltok/xmltok_impl.c: change if statement for ptr pointer when
      comparing to end pointer.
    - CVE-2016-0718
  * SECURITY UPDATE: denial of service
    - xmlparse/xmlparse.c: add a break statement in setElementTypePrefix().
    - CVE-2018-20843
  * SECURITY UPDATE: Heap-based buffer over-read
    - xmlparse/xmlparse.c: add a new parameter, allowClosingDoctype,
      to doProlog() and when in case XML_ROLE_DOCTYPE_CLOSE, verify if
      this parameter is not true and return an error. When invoking
      doProlog from prologProcessor(), passes allowClosingDoctype as true,
      and when invoking from processInternalParamEntity() passes
      allowClosingDoctype as false.
    - CVE-2019-15903
  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2021-46143.patch: add an integer overflow check
      for groupSize variable at doProlog() in xmlparse/xmlparse.c.
    - CVE-2021-46143

 -- Bruce Cable <email address hidden> Mon, 06 Jan 2025 15:43:25 +1100

CVE-2022-22822 addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2022-22823 build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2022-22824 defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2022-22825 lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2022-22826 nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2022-22827 storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
CVE-2015-1283 Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, all
CVE-2016-4472 The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of servi
CVE-2016-0718 Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, whic
CVE-2018-20843 In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amoun
CVE-2019-15903 In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to
CVE-2021-46143 In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.



About   -   Send Feedback to @ubuntu_updates