[Secure-testing-commits] r37759 - data/CVE

Henri Salo fgeek-guest at moszumanska.debian.org
Wed Nov 18 17:06:27 UTC 2015


Author: fgeek-guest
Date: 2015-11-18 17:06:26 +0000 (Wed, 18 Nov 2015)
New Revision: 37759

Modified:
   data/CVE/list
Log:
CVE-2015-8242/libxml2, syntax fix

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2015-11-18 17:03:02 UTC (rev 37758)
+++ data/CVE/list	2015-11-18 17:06:26 UTC (rev 37759)
@@ -1,10 +1,17 @@
+CVE-2015-8242 [Buffer overread with HTML parser in push mode in xmlSAX2TextNode]
+	- libxml2 <unfixed> (bug #805146)
+	[jessie] - libxml2 <not-affected> (Vulnerable code introduced later)
+	[wheezy] - libxml2 <not-affected> (Vulnerable code introduced later)
+	[squeeze] - libxml2 <not-affected> (Vulnerable code introduced later)
+	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756372
+	NOTE: Introduced by: https://git.gnome.org/browse/libxml2/commit/?id=826bc320206f70fccd2941a77d363e95e8076898 (v2.9.2-rc1)
 CVE-2015-8241 [Buffer overread with XML parser in xmlNextChar]
-    - libxml2 <unfixed>
-    NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756263
-    NOTE: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
-    NOTE: Possibly introduced by https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (fix for CVE-2015-7941)
-    NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/11/17/5
-    TODO: check versions
+	- libxml2 <unfixed>
+	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756263
+	NOTE: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
+	NOTE: Possibly introduced by https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (fix for CVE-2015-7941)
+	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/11/17/5
+	TODO: check versions
 CVE-2015-8239 [race condition checking digests/checksums in sudoers]
 	- sudo <unfixed>
 	NOTE: http://www.openwall.com/lists/oss-security/2015/11/10/2
@@ -200,13 +207,6 @@
 	NOTE: https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8
 	NOTE: http://www.openwall.com/lists/oss-security/2015/11/18/9
 	TODO: check
-CVE-2015-XXXX [Buffer overread with HTML parser in push mode in xmlSAX2TextNode]
-	- libxml2 <unfixed> (bug #805146)
-	[jessie] - libxml2 <not-affected> (Vulnerable code introduced later)
-	[wheezy] - libxml2 <not-affected> (Vulnerable code introduced later)
-	[squeeze] - libxml2 <not-affected> (Vulnerable code introduced later)
-	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756372
-	NOTE: Introduced by: https://git.gnome.org/browse/libxml2/commit/?id=826bc320206f70fccd2941a77d363e95e8076898 (v2.9.2-rc1)
 CVE-2015-XXXX [Out-of-bounds heap read on 0xff char in xml declaration]
 	- libxml2 <unfixed>
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=751631




More information about the Secure-testing-commits mailing list