CVE-2016-9318

NameCVE-2016-9318
Descriptionlibxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2972-1
Debian Bugs844581

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)jessie, jessie (lts)2.9.1+dfsg1-5+deb8u15vulnerable
stretch (security)2.9.4+dfsg1-2.2+deb9u7fixed
stretch (lts), stretch2.9.4+dfsg1-2.2+deb9u10fixed
buster2.9.4+dfsg1-7+deb10u4vulnerable
buster (security)2.9.4+dfsg1-7+deb10u6vulnerable
bullseye (security), bullseye2.9.10+dfsg-6.7+deb11u4fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
sid, trixie2.9.14+dfsg-1.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourceexperimental2.9.8+dfsg-1
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u6DLA-2972-1
libxml2source(unstable)2.9.10+dfsg-2844581

Notes

[buster] - libxml2 <ignored> (Minor issue; intrusive to backport)
[jessie] - libxml2 <ignored> (Minor issue; intrusive to backport)
[wheezy] - libxml2 <no-dsa> (Minor issue)
Upstream Bug: https://bugzilla.gnome.org/show_bug.cgi?id=772726
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2304078555896cf1638c628f50326aeef6f0e0d0
The patch introduces a new option that can be specified if this
behaviour is wanted. Not enforced by default.
The option though was reverted in https://gitlab.gnome.org/GNOME/libxml2/-/commit/030b1f7a27c22f9237eddca49ec5e620b6258d7d
New proposed/commited fix: https://gitlab.gnome.org/GNOME/libxml2/-/commit/ad88b54f1a28a8565964a370b5d387927b633c0d

Search for package or bug name: Reporting problems