Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#47095 - [libxml2] buffer overflow in xmlParseMarkupDecl()
Attached to Project:
Arch Linux
Opened by Remi Gacogne (rgacogne) - Tuesday, 17 November 2015, 15:16 GMT
Last edited by Jan de Groot (JGC) - Wednesday, 09 December 2015, 13:54 GMT
Opened by Remi Gacogne (rgacogne) - Tuesday, 17 November 2015, 15:16 GMT
Last edited by Jan de Groot (JGC) - Wednesday, 09 December 2015, 13:54 GMT
|
DetailsHello,
A buffer overflow has been found[1] in libxml2 <= 2.9.2, allowing at least denial of service. A patch[2] is available upstream but no new version has been released yet, so we probably should backport it. There is no CVE assigned[3] yet that I am aware of, I will update as soon as one has been. [1]: https://bugzilla.gnome.org/show_bug.cgi?id=756263 [2]: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe [3]: http://seclists.org/oss-sec/2015/q4/291 |
This task depends upon
http://seclists.org/oss-sec/2015/q4/328
https://mail.gnome.org/archives/xml/2015-November/msg00012.html