import CS libxml2-2.9.13-9.el9
This commit is contained in:
parent
dbda0c16ab
commit
42e05b8a5b
32
SOURCES/libxml2-2.11.0-fix-CVE-2023-39615.patch
Normal file
32
SOURCES/libxml2-2.11.0-fix-CVE-2023-39615.patch
Normal file
@ -0,0 +1,32 @@
|
|||||||
|
From d0c3f01e110d54415611c5fa0040cdf4a56053f9 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||||
|
Date: Sat, 6 May 2023 17:47:37 +0200
|
||||||
|
Subject: [PATCH] parser: Fix old SAX1 parser with custom callbacks
|
||||||
|
|
||||||
|
For some reason, xmlCtxtUseOptionsInternal set the start and end element
|
||||||
|
SAX handlers to the internal DOM builder functions when XML_PARSE_SAX1
|
||||||
|
was specified. This means that custom SAX handlers could never work with
|
||||||
|
that flag because these functions would receive the wrong user data
|
||||||
|
argument and crash immediately.
|
||||||
|
|
||||||
|
Fixes #535.
|
||||||
|
---
|
||||||
|
parser.c | 2 --
|
||||||
|
1 file changed, 2 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/parser.c b/parser.c
|
||||||
|
index bb05791d3..0c8bed129 100644
|
||||||
|
--- a/parser.c
|
||||||
|
+++ b/parser.c
|
||||||
|
@@ -14479,8 +14479,6 @@ xmlCtxtUseOptionsInternal(xmlParserCtxtPtr ctxt, int options, const char *encodi
|
||||||
|
}
|
||||||
|
#ifdef LIBXML_SAX1_ENABLED
|
||||||
|
if (options & XML_PARSE_SAX1) {
|
||||||
|
- ctxt->sax->startElement = xmlSAX2StartElement;
|
||||||
|
- ctxt->sax->endElement = xmlSAX2EndElement;
|
||||||
|
ctxt->sax->startElementNs = NULL;
|
||||||
|
ctxt->sax->endElementNs = NULL;
|
||||||
|
ctxt->sax->initialized = 1;
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
|
|
29
SOURCES/libxml2-2.11.6-CVE-2024-25062.patch
Normal file
29
SOURCES/libxml2-2.11.6-CVE-2024-25062.patch
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
From 2b0aac140d739905c7848a42efc60bfe783a39b7 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||||
|
Date: Sat, 14 Oct 2023 22:45:54 +0200
|
||||||
|
Subject: [PATCH] [CVE-2024-25062] xmlreader: Don't expand XIncludes when
|
||||||
|
backtracking
|
||||||
|
|
||||||
|
Fixes a use-after-free if XML Reader if used with DTD validation and
|
||||||
|
XInclude expansion.
|
||||||
|
|
||||||
|
Fixes #604.
|
||||||
|
---
|
||||||
|
xmlreader.c | 1 +
|
||||||
|
1 file changed, 1 insertion(+)
|
||||||
|
|
||||||
|
diff --git a/xmlreader.c b/xmlreader.c
|
||||||
|
index 979385a13..fefd68e0b 100644
|
||||||
|
--- a/xmlreader.c
|
||||||
|
+++ b/xmlreader.c
|
||||||
|
@@ -1443,6 +1443,7 @@ node_found:
|
||||||
|
* Handle XInclude if asked for
|
||||||
|
*/
|
||||||
|
if ((reader->xinclude) && (reader->in_xinclude == 0) &&
|
||||||
|
+ (reader->state != XML_TEXTREADER_BACKTRACK) &&
|
||||||
|
(reader->node != NULL) &&
|
||||||
|
(reader->node->type == XML_ELEMENT_NODE) &&
|
||||||
|
(reader->node->ns != NULL) &&
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
|
|
34
SOURCES/libxml2-2.9.13-CVE-2022-49043.patch
Normal file
34
SOURCES/libxml2-2.9.13-CVE-2022-49043.patch
Normal file
@ -0,0 +1,34 @@
|
|||||||
|
From 6bb146a3ea24a9bacfad6fe67268f0404af37d9c Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||||
|
Date: Wed, 2 Nov 2022 16:13:27 +0100
|
||||||
|
Subject: [PATCH] malloc-fail: Fix use-after-free in xmlXIncludeAddNode
|
||||||
|
|
||||||
|
Found with libFuzzer, see #344.
|
||||||
|
---
|
||||||
|
xinclude.c | 3 ++-
|
||||||
|
1 file changed, 2 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/xinclude.c b/xinclude.c
|
||||||
|
index 2a0614d7..e32b3419 100644
|
||||||
|
--- a/xinclude.c
|
||||||
|
+++ b/xinclude.c
|
||||||
|
@@ -614,14 +614,15 @@ xmlXIncludeAddNode(xmlXIncludeCtxtPtr ctxt, xmlNodePtr cur) {
|
||||||
|
}
|
||||||
|
URL = xmlSaveUri(uri);
|
||||||
|
xmlFreeURI(uri);
|
||||||
|
- xmlFree(URI);
|
||||||
|
if (URL == NULL) {
|
||||||
|
xmlXIncludeErr(ctxt, cur, XML_XINCLUDE_HREF_URI,
|
||||||
|
"invalid value URI %s\n", URI);
|
||||||
|
if (fragment != NULL)
|
||||||
|
xmlFree(fragment);
|
||||||
|
+ xmlFree(URI);
|
||||||
|
return(-1);
|
||||||
|
}
|
||||||
|
+ xmlFree(URI);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If local and xml then we need a fragment
|
||||||
|
--
|
||||||
|
2.48.1
|
||||||
|
|
41
SOURCES/libxml2-2.9.13-CVE-2024-56171.patch
Normal file
41
SOURCES/libxml2-2.9.13-CVE-2024-56171.patch
Normal file
@ -0,0 +1,41 @@
|
|||||||
|
From 245b70d7d2768572ae1b05b3668ca858b9ec4ed4 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||||
|
Date: Tue, 10 Dec 2024 16:52:05 +0100
|
||||||
|
Subject: [PATCH] [CVE-2024-56171] Fix use-after-free after
|
||||||
|
xmlSchemaItemListAdd
|
||||||
|
|
||||||
|
xmlSchemaItemListAdd can reallocate the items array. Update local
|
||||||
|
variables after adding item in
|
||||||
|
|
||||||
|
- xmlSchemaIDCFillNodeTables
|
||||||
|
- xmlSchemaBubbleIDCNodeTables
|
||||||
|
|
||||||
|
Fixes #828.
|
||||||
|
---
|
||||||
|
xmlschemas.c | 3 +++
|
||||||
|
1 file changed, 3 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/xmlschemas.c b/xmlschemas.c
|
||||||
|
index d276faf10..28b14bd44 100644
|
||||||
|
--- a/xmlschemas.c
|
||||||
|
+++ b/xmlschemas.c
|
||||||
|
@@ -23388,6 +23388,7 @@ xmlSchemaIDCFillNodeTables(xmlSchemaValidCtxtPtr vctxt,
|
||||||
|
}
|
||||||
|
if (xmlSchemaItemListAdd(bind->dupls, bind->nodeTable[j]) == -1)
|
||||||
|
goto internal_error;
|
||||||
|
+ dupls = (xmlSchemaPSVIIDCNodePtr *) bind->dupls->items;
|
||||||
|
/*
|
||||||
|
* Remove the duplicate entry from the IDC node-table.
|
||||||
|
*/
|
||||||
|
@@ -23604,6 +23605,8 @@ xmlSchemaBubbleIDCNodeTables(xmlSchemaValidCtxtPtr vctxt)
|
||||||
|
goto internal_error;
|
||||||
|
}
|
||||||
|
xmlSchemaItemListAdd(parBind->dupls, parNode);
|
||||||
|
+ dupls = (xmlSchemaPSVIIDCNodePtr *)
|
||||||
|
+ parBind->dupls->items;
|
||||||
|
} else {
|
||||||
|
/*
|
||||||
|
* Add the node-table entry (node and key-sequence) of
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
|
|
57
SOURCES/libxml2-2.9.13-CVE-2025-24928.patch
Normal file
57
SOURCES/libxml2-2.9.13-CVE-2025-24928.patch
Normal file
@ -0,0 +1,57 @@
|
|||||||
|
From 858ca26c0689161a6b903a6682cc8a1cc10a0ea8 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Nick Wellnhofer <wellnhofer@aevum.de>
|
||||||
|
Date: Tue, 11 Feb 2025 17:30:40 +0100
|
||||||
|
Subject: [PATCH] [CVE-2025-24928] Fix stack-buffer-overflow in
|
||||||
|
xmlSnprintfElements
|
||||||
|
|
||||||
|
Fixes #847.
|
||||||
|
---
|
||||||
|
valid.c | 25 +++++++++++++------------
|
||||||
|
1 file changed, 13 insertions(+), 12 deletions(-)
|
||||||
|
|
||||||
|
diff --git a/valid.c b/valid.c
|
||||||
|
index 76d657d62..abefdc50a 100644
|
||||||
|
--- a/valid.c
|
||||||
|
+++ b/valid.c
|
||||||
|
@@ -5057,25 +5057,26 @@ xmlSnprintfElements(char *buf, int size, xmlNodePtr node, int glob) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
switch (cur->type) {
|
||||||
|
- case XML_ELEMENT_NODE:
|
||||||
|
+ case XML_ELEMENT_NODE: {
|
||||||
|
+ int qnameLen = xmlStrlen(cur->name);
|
||||||
|
+
|
||||||
|
+ if ((cur->ns != NULL) && (cur->ns->prefix != NULL))
|
||||||
|
+ qnameLen += xmlStrlen(cur->ns->prefix) + 1;
|
||||||
|
+ if (size - len < qnameLen + 10) {
|
||||||
|
+ if ((size - len > 4) && (buf[len - 1] != '.'))
|
||||||
|
+ strcat(buf, " ...");
|
||||||
|
+ return;
|
||||||
|
+ }
|
||||||
|
if ((cur->ns != NULL) && (cur->ns->prefix != NULL)) {
|
||||||
|
- if (size - len < xmlStrlen(cur->ns->prefix) + 10) {
|
||||||
|
- if ((size - len > 4) && (buf[len - 1] != '.'))
|
||||||
|
- strcat(buf, " ...");
|
||||||
|
- return;
|
||||||
|
- }
|
||||||
|
strcat(buf, (char *) cur->ns->prefix);
|
||||||
|
strcat(buf, ":");
|
||||||
|
}
|
||||||
|
- if (size - len < xmlStrlen(cur->name) + 10) {
|
||||||
|
- if ((size - len > 4) && (buf[len - 1] != '.'))
|
||||||
|
- strcat(buf, " ...");
|
||||||
|
- return;
|
||||||
|
- }
|
||||||
|
- strcat(buf, (char *) cur->name);
|
||||||
|
+ if (cur->name != NULL)
|
||||||
|
+ strcat(buf, (char *) cur->name);
|
||||||
|
if (cur->next != NULL)
|
||||||
|
strcat(buf, " ");
|
||||||
|
break;
|
||||||
|
+ }
|
||||||
|
case XML_TEXT_NODE:
|
||||||
|
if (xmlIsBlankNode(cur))
|
||||||
|
break;
|
||||||
|
--
|
||||||
|
GitLab
|
||||||
|
|
@ -1,6 +1,6 @@
|
|||||||
Name: libxml2
|
Name: libxml2
|
||||||
Version: 2.9.13
|
Version: 2.9.13
|
||||||
Release: 4%{?dist}
|
Release: 9%{?dist}
|
||||||
Summary: Library providing XML and HTML support
|
Summary: Library providing XML and HTML support
|
||||||
|
|
||||||
License: MIT
|
License: MIT
|
||||||
@ -20,6 +20,16 @@ Patch4: libxml2-2.9.13-CVE-2022-40304.patch
|
|||||||
Patch5: libxml2-2.9.13-CVE-2023-28484.patch
|
Patch5: libxml2-2.9.13-CVE-2023-28484.patch
|
||||||
Patch6: libxml2-2.9.13-CVE-2023-28484.2.patch
|
Patch6: libxml2-2.9.13-CVE-2023-28484.2.patch
|
||||||
Patch7: libxml2-2.9.13-CVE-2023-29469.patch
|
Patch7: libxml2-2.9.13-CVE-2023-29469.patch
|
||||||
|
# https://issues.redhat.com/browse/RHEL-5180
|
||||||
|
Patch8: libxml2-2.11.0-fix-CVE-2023-39615.patch
|
||||||
|
# https://issues.redhat.com/browse/RHEL-34457
|
||||||
|
Patch9: libxml2-2.11.6-CVE-2024-25062.patch
|
||||||
|
# https://issues.redhat.com/browse/RHEL-76298
|
||||||
|
Patch10: libxml2-2.9.13-CVE-2022-49043.patch
|
||||||
|
# https://issues.redhat.com/browse/RHEL-80127
|
||||||
|
Patch11: libxml2-2.9.13-CVE-2024-56171.patch
|
||||||
|
# https://issues.redhat.com/browse/RHEL-80142
|
||||||
|
Patch12: libxml2-2.9.13-CVE-2025-24928.patch
|
||||||
|
|
||||||
BuildRequires: cmake-rpm-macros
|
BuildRequires: cmake-rpm-macros
|
||||||
BuildRequires: gcc
|
BuildRequires: gcc
|
||||||
@ -148,6 +158,21 @@ gzip -9 -c doc/libxml2-api.xml > doc/libxml2-api.xml.gz
|
|||||||
%{python3_sitearch}/libxml2mod.so
|
%{python3_sitearch}/libxml2mod.so
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Wed Feb 26 2025 David King <dking@redhat.com> - 2.9.13-9
|
||||||
|
- Fix CVE-2025-24928 (RHEL-80142)
|
||||||
|
|
||||||
|
* Tue Feb 25 2025 David King <dking@redhat.com> - 2.9.13-8
|
||||||
|
- Fix CVE-2024-56171 (RHEL-80127)
|
||||||
|
|
||||||
|
* Tue Feb 11 2025 David King <dking@redhat.com> - 2.9.13-7
|
||||||
|
- Fix CVE-2022-49043 (RHEL-76298)
|
||||||
|
|
||||||
|
* Mon Apr 29 2024 David King <amigadave@amigadave.com> - 2.9.13-6
|
||||||
|
- Fix CVE-2024-25062 (RHEL-29196)
|
||||||
|
|
||||||
|
* Thu Sep 14 2023 David King <amigadave@amigadave.com> - 2.9.13-5
|
||||||
|
- Fix CVE-2023-39615 (RHEL-5180)
|
||||||
|
|
||||||
* Fri Apr 14 2023 David King <amigadave@amigadave.com> - 2.9.13-4
|
* Fri Apr 14 2023 David King <amigadave@amigadave.com> - 2.9.13-4
|
||||||
- Fix CVE-2023-28484 (#2186694)
|
- Fix CVE-2023-28484 (#2186694)
|
||||||
- Fix CVE-2023-29469 (#2186694)
|
- Fix CVE-2023-29469 (#2186694)
|
||||||
|
Loading…
Reference in New Issue
Block a user