<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libxml2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0764-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-05-22T05:03:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-22T05:03:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-05-22T05:03:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libxml2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libxml2 fixes the following issues:

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-764</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185408</URL>
      <Description>SUSE Bug 1185408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185409</URL>
      <Description>SUSE Bug 1185409</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185410</URL>
      <Description>SUSE Bug 1185410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185698</URL>
      <Description>SUSE Bug 1185698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3516/</URL>
      <Description>SUSE CVE CVE-2021-3516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3517/</URL>
      <Description>SUSE CVE CVE-2021-3517 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3518/</URL>
      <Description>SUSE CVE CVE-2021-3518 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3537/</URL>
      <Description>SUSE CVE CVE-2021-3537 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-2-2.9.7-lp152.10.12.1">libxml2-2-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-32bit-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-2-32bit-2.9.7-lp152.10.12.1">libxml2-2-32bit-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-devel-2.9.7-lp152.10.12.1">libxml2-devel-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-32bit-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-devel-32bit-2.9.7-lp152.10.12.1">libxml2-devel-32bit-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-doc-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-doc-2.9.7-lp152.10.12.1">libxml2-doc-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-tools-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="libxml2-tools-2.9.7-lp152.10.12.1">libxml2-tools-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-libxml2-python-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="python2-libxml2-python-2.9.7-lp152.10.12.1">python2-libxml2-python-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-libxml2-python-2.9.7-lp152.10.12.1">
      <FullProductName ProductID="python3-libxml2-python-2.9.7-lp152.10.12.1">python3-libxml2-python-2.9.7-lp152.10.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libxml2-2-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-2-2.9.7-lp152.10.12.1">libxml2-2-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-32bit-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-2-32bit-2.9.7-lp152.10.12.1">libxml2-2-32bit-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-devel-2.9.7-lp152.10.12.1">libxml2-devel-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-devel-32bit-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-devel-32bit-2.9.7-lp152.10.12.1">libxml2-devel-32bit-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-doc-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-doc-2.9.7-lp152.10.12.1">libxml2-doc-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libxml2-tools-2.9.7-lp152.10.12.1">libxml2-tools-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python2-libxml2-python-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:python2-libxml2-python-2.9.7-lp152.10.12.1">python2-libxml2-python-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-libxml2-python-2.9.7-lp152.10.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:python3-libxml2-python-2.9.7-lp152.10.12.1">python3-libxml2-python-2.9.7-lp152.10.12.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.</Note>
    </Notes>
    <CVE>CVE-2021-3516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libxml2-2-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-2-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-doc-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-tools-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python2-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python3-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3516.html</URL>
        <Description>CVE-2021-3516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185409</URL>
        <Description>SUSE Bug 1185409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.</Note>
    </Notes>
    <CVE>CVE-2021-3517</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libxml2-2-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-2-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-doc-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-tools-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python2-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python3-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3517.html</URL>
        <Description>CVE-2021-3517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185410</URL>
        <Description>SUSE Bug 1185410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194438</URL>
        <Description>SUSE Bug 1194438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196383</URL>
        <Description>SUSE Bug 1196383</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.</Note>
    </Notes>
    <CVE>CVE-2021-3518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libxml2-2-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-2-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-doc-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-tools-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python2-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python3-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3518.html</URL>
        <Description>CVE-2021-3518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185408</URL>
        <Description>SUSE Bug 1185408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191860</URL>
        <Description>SUSE Bug 1191860</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.</Note>
    </Notes>
    <CVE>CVE-2021-3537</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libxml2-2-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-2-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-devel-32bit-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-doc-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libxml2-tools-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python2-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
        <ProductID>openSUSE Leap 15.2:python3-libxml2-python-2.9.7-lp152.10.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3537.html</URL>
        <Description>CVE-2021-3537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185698</URL>
        <Description>SUSE Bug 1185698</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
