Summary: | <dev-libs/libxml2-2.9.4: Out-of-bounds Read in the libxml2's htmlParseNameComplex() function | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | gnome |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2016/01/25/6 | ||
Whiteboard: | A2 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-01-25 14:34:56 UTC
CVE-2016-2073 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2073): The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document. Upstream solved this as part of the fix for bug 573820 (CVE-2016-1839), see https://github.com/GNOME/libxml2/commit/a820dbeac29d330bae4be05d9ecd939ad6b4aa33. This issue was resolved and addressed in GLSA 201701-37 at https://security.gentoo.org/glsa/201701-37 by GLSA coordinator Thomas Deutschmann (whissi). This issue was resolved and addressed in GLSA 201701-37 at https://security.gentoo.org/glsa/201701-37 by GLSA coordinator Thomas Deutschmann (whissi). |