Summary: | <dev-libs/libxml2-2.9.2-r4: Out-of-bounds memory access when parsing unclosed HTML comment | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | gnome |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.gnome.org/show_bug.cgi?id=746048 | ||
See Also: |
https://bugzilla.redhat.com/show_bug.cgi?id=1262849 https://bugs.gentoo.org/show_bug.cgi?id=565574 |
||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 564240, 564776 |
Description
Agostino Sarubbo
![]() Following links, I found the upstream bug report. Upstream patch applied in 2.9.2-r2. Arches, please test and mark stable: =dev-libs/libxml2-2.9.2-r4 Target keywords : "alpha amd64 arm arm64 hppa ia64 m68k ppc ppc64 s390 sh sparc x86" amd64 stable x86 stable Stable for PPC64. Stable for HPPA. ppc stable !!! Digest verification failed: !!! /usr/portage/dev-libs/libxml2/ChangeLog !!! Reason: Filesize does not match recorded size !!! Got: 5038 !!! Expected: 4685 alpha stable arm stable s390 stable ia64 stable sparc stable The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment. Re-designating as this is not default or common software in the tree (do we really have any statistics on that anyway?) nor was the original vulnerability reported accurately. GLSA Vote: No. |