[ubuntu/plucky-proposed] libxmltok 1.2-4.1ubuntu4 (Accepted)

Bruce Cable bruce.cable at canonical.com
Thu Feb 27 00:15:20 UTC 2025


libxmltok (1.2-4.1ubuntu4) plucky; urgency=medium

  * SECURITY UPDATE: integer overflow
    - xmlparse/xmlparse.c: add integer overflow checks and signed
      arthimetic
    - CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825,
    - CVE-2022-22826, CVE-2022-22827, CVE-2015-1283, CVE-2016-4472
  * SECURITY UPDATE: buffer overflow and integer overflow
    - xmlparse/xmlparse.c: assign a result for XmlConvert calls and verify
      if it matches with the expected XML_Convert_Result enum values.
      Add an integer overflow check and proper signed arithmetic
      overflow for blockSize in poolGrow().
    - xmltok/xmltok.c: add XML_Convert_Result return value for utf8_toUtf8,
      utf8_toUtf16, latin1_toUtf8, latin1_toUtf16, ascii_toUtf8, toUtf8,
      toUtf16, unknown_toUtf8 and unknown_toUtf16 methods.
    - xmltok/xmltok.h: add XML_Convert_Result enum values and return values
      for the above methods definitions.
    - xmltok/xmltok_impl.c: change if statement for ptr pointer when
      comparing to end pointer.
    - CVE-2016-0718
  * SECURITY UPDATE: denial of service
    - xmlparse/xmlparse.c: add a break statement in setElementTypePrefix().
    - CVE-2018-20843
  * SECURITY UPDATE: Heap-based buffer over-read
    - xmlparse/xmlparse.c: add a new parameter, allowClosingDoctype,
      to doProlog() and when in case XML_ROLE_DOCTYPE_CLOSE, verify if
      this parameter is not true and return an error. When invoking
      doProlog from prologProcessor(), passes allowClosingDoctype as true,
      and when invoking from processInternalParamEntity() passes
      allowClosingDoctype as false.
    - CVE-2019-15903
  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2021-46143.patch: add an integer overflow check
      for groupSize variable at doProlog() in xmlparse/xmlparse.c.
    - CVE-2021-46143
  * SECURITY UPDATE: Memory leak
    - xmlparse/xmlparse.c: create a temporary variable to handle possible
      errors for pool->blocks realloc invocation in poolGrow().
    - CVE-2012-1148

Date: Wed, 26 Feb 2025 10:26:51 +1100
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Alex Murray <alex.murray at canonical.com>
https://launchpad.net/ubuntu/+source/libxmltok/1.2-4.1ubuntu4
-------------- next part --------------
Format: 1.8
Date: Wed, 26 Feb 2025 10:26:51 +1100
Source: libxmltok
Built-For-Profiles: noudeb
Architecture: source
Version: 1.2-4.1ubuntu4
Distribution: plucky
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Bruce Cable <bruce.cable at canonical.com>
Changes:
 libxmltok (1.2-4.1ubuntu4) plucky; urgency=medium
 .
   * SECURITY UPDATE: integer overflow
     - xmlparse/xmlparse.c: add integer overflow checks and signed
       arthimetic
     - CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825,
     - CVE-2022-22826, CVE-2022-22827, CVE-2015-1283, CVE-2016-4472
   * SECURITY UPDATE: buffer overflow and integer overflow
     - xmlparse/xmlparse.c: assign a result for XmlConvert calls and verify
       if it matches with the expected XML_Convert_Result enum values.
       Add an integer overflow check and proper signed arithmetic
       overflow for blockSize in poolGrow().
     - xmltok/xmltok.c: add XML_Convert_Result return value for utf8_toUtf8,
       utf8_toUtf16, latin1_toUtf8, latin1_toUtf16, ascii_toUtf8, toUtf8,
       toUtf16, unknown_toUtf8 and unknown_toUtf16 methods.
     - xmltok/xmltok.h: add XML_Convert_Result enum values and return values
       for the above methods definitions.
     - xmltok/xmltok_impl.c: change if statement for ptr pointer when
       comparing to end pointer.
     - CVE-2016-0718
   * SECURITY UPDATE: denial of service
     - xmlparse/xmlparse.c: add a break statement in setElementTypePrefix().
     - CVE-2018-20843
   * SECURITY UPDATE: Heap-based buffer over-read
     - xmlparse/xmlparse.c: add a new parameter, allowClosingDoctype,
       to doProlog() and when in case XML_ROLE_DOCTYPE_CLOSE, verify if
       this parameter is not true and return an error. When invoking
       doProlog from prologProcessor(), passes allowClosingDoctype as true,
       and when invoking from processInternalParamEntity() passes
       allowClosingDoctype as false.
     - CVE-2019-15903
   * SECURITY UPDATE: Integer overflow
     - debian/patches/CVE-2021-46143.patch: add an integer overflow check
       for groupSize variable at doProlog() in xmlparse/xmlparse.c.
     - CVE-2021-46143
   * SECURITY UPDATE: Memory leak
     - xmlparse/xmlparse.c: create a temporary variable to handle possible
       errors for pool->blocks realloc invocation in poolGrow().
     - CVE-2012-1148
Checksums-Sha1:
 21276f0ab6cc780c26cd4d7351c188df1560d92e 1689 libxmltok_1.2-4.1ubuntu4.dsc
 4dd18c8faf887745dc686db42ce825866b421269 17416 libxmltok_1.2-4.1ubuntu4.debian.tar.xz
 4c2ce73e39dbc366240df71b6d3482664b8c99c9 5738 libxmltok_1.2-4.1ubuntu4_source.buildinfo
Checksums-Sha256:
 43cf5dce581033367ac1ec5434929a3ce235533e75d4b83881de8f10e51892a0 1689 libxmltok_1.2-4.1ubuntu4.dsc
 bf86f4161bf875801d1b954ad77604783a009ab67c01793a3cff5c9291af372c 17416 libxmltok_1.2-4.1ubuntu4.debian.tar.xz
 91d11638ad953f9937639e1cffd09f6dce08cc83aa73ae04e6cdcba1185bf083 5738 libxmltok_1.2-4.1ubuntu4_source.buildinfo
Files:
 b5fa40bee1aa15cf30ed5b573f643e1c 1689 libs optional libxmltok_1.2-4.1ubuntu4.dsc
 0df72b90b697b98d80b7926fdc40f7b1 17416 libs optional libxmltok_1.2-4.1ubuntu4.debian.tar.xz
 edec3f358c3eafedd67956a649cd30d6 5738 libs optional libxmltok_1.2-4.1ubuntu4_source.buildinfo
Original-Maintainer: Debian XML/SGML Group <debian-xml-sgml-pkgs at lists.alioth.debian.org>


More information about the plucky-changes mailing list