Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 564240 (CVE-2015-7942)

Summary: <dev-libs/libxml2-2.9.2-r4: Crafted xml causes out of bound memory access
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: gnome
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.openwall.com/lists/oss-security/2015/10/22/5
Whiteboard: B3 [noglsa]
Package list:
Runtime testing required: ---
Bug Depends on: 560524    
Bug Blocks:    

Description Agostino Sarubbo gentoo-dev 2015-10-27 08:36:51 UTC
From ${URL} :

Description : Out of bound read in libxml2 with crafted xml input. It is
detected using Fuzzer - American fuzzy loop.

Reported discussion : https://bugzilla.gnome.org/show_bug.cgi?id=744980

Upstream Fixes :
1.
https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31

2.
https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Gilles Dartiguelongue (RETIRED) gentoo-dev 2015-11-09 20:38:10 UTC
Upstream patches applied in 2.9.2-r2.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2016-07-19 12:08:18 UTC
CVE:

The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.


Once again, not sure why this is counted as a common package.  Re-designating to B3.

GLSA Vote: No