[Git][security-tracker-team/security-tracker][master] libxml2: Fixing links from old git.gnome.org to gitlab.gnome.org.
Tobias Frost (@tobi)
tobi at debian.org
Mon Apr 17 17:47:00 BST 2023
Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a4f40a27 by Tobias Frost at 2023-04-17T18:45:01+02:00
libxml2: Fixing links from old git.gnome.org to gitlab.gnome.org.
(Migrate URLs from old https://git.gnome.org/browse/libxml2/commit/?id= to https://gitlab.gnome.org/GNOME/libxml2/-/commit/)
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -344066,7 +344066,7 @@ CVE-2018-9251 (The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzm
- libxml2 <not-affected> (Fix for CVE-2017-18258 not applied, cf. bug #895195)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=794914
NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
- NOTE: Before upstream commit https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
+ NOTE: Before upstream commit https://gitlab.gnome.org/GNOME/libxml2/-/commit/e2a9122b8dde53d320750451e9907a7dcb2ca8bb
NOTE: the memlimit argument to lzma_auto_decoder was set to UINT64_MAX, possibly
NOTE: allowing a malicious LZMA compressed files to consume large amounts of memory
NOTE: when decompressed. Setting memlimit to UINT64_MAX the limiter is effectively
@@ -344081,7 +344081,7 @@ CVE-2017-18258 (The xz_head function in xzlib.c in libxml2 before 2.9.6 allows r
[buster] - libxml2 2.9.4+dfsg1-7+deb10u1
[wheezy] - libxml2 <postponed> (Minor issue; wait for upstream fix for upstream bug 794914)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=786696
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/e2a9122b8dde53d320750451e9907a7dcb2ca8bb
NOTE: When fixing this issue make sure to not open CVE-2018-9251 and apply
NOTE: the fix for CVE-2018-9251 / https://bugzilla.gnome.org/show_bug.cgi?id=794914
CVE-2018-9250 (interface\super\edit_list.php in OpenEMR before v5_0_1_1 allows remote ...)
@@ -376288,7 +376288,7 @@ CVE-2017-15412 (Use after free in libxml2 before 2.9.5, as used in Google Chrome
- libxml2 2.9.4+dfsg1-5.2 (bug #883790)
NOTE: https://bugs.chromium.org/p/chromium/issues/detail?id=727039
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=783160 (not public)
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=0f3b843b3534784ef57a4f9b874238aa1fda5a73
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/0f3b843b3534784ef57a4f9b874238aa1fda5a73
CVE-2017-15411 (Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowe ...)
{DSA-4064-1}
- chromium-browser 63.0.3239.84-1
@@ -395796,25 +395796,25 @@ CVE-2017-9050 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based
- libxml2 2.9.4+dfsg1-3.1 (bug #863018)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781361 (not public)
NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=e26630548e7d138d2c560844c43820b6767251e3
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/e26630548e7d138d2c560844c43820b6767251e3
CVE-2017-9049 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buff ...)
{DSA-3952-1 DLA-1008-1}
- libxml2 2.9.4+dfsg1-3.1 (bug #863019)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781205 (not public)
NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=e26630548e7d138d2c560844c43820b6767251e3
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/e26630548e7d138d2c560844c43820b6767251e3
CVE-2017-9048 (libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buf ...)
{DSA-3952-1 DLA-1008-1}
- libxml2 2.9.4+dfsg1-3.1 (bug #863021)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781701 (not public)
NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=932cc9896ab41475d4aa429c27d9afd175959d74
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/932cc9896ab41475d4aa429c27d9afd175959d74
CVE-2017-9047 (A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g074180 ...)
{DSA-3952-1 DLA-1008-1}
- libxml2 2.9.4+dfsg1-3.1 (bug #863022)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=781333 (not public)
NOTE: https://www.openwall.com/lists/oss-security/2017/05/15/1
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=932cc9896ab41475d4aa429c27d9afd175959d74
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/932cc9896ab41475d4aa429c27d9afd175959d74
CVE-2017-9046 (winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code e ...)
NOT-FOR-US: Pegasus Mail
CVE-2017-9045 (The Google I/O 2017 application before 5.1.4 for Android downloads mul ...)
@@ -401181,7 +401181,7 @@ CVE-2017-7376 (Buffer overflow in libxml2 allows remote attackers to execute arb
- libxml2 2.9.4+dfsg1-3.1 (bug #870865)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=780690 (not yet public)
NOTE: Android patch: https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4
- NOTE: Fix upstream: https://git.gnome.org/browse/libxml2/commit/?id=5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
+ NOTE: Fix upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/5dca9eea1bd4263bfa4d037ab2443de1cd730f7e
NOTE: The upstream patch has the slight consequence that some port values end up
NOTE: negative when cast to a 32-bit int. A negative port though in the URL would
NOTE: make the URL invalid. It is discussed if instead it would be best to prevent
@@ -401191,7 +401191,7 @@ CVE-2017-7375 (A flaw in libxml2 allows remote XML entity inclusion with default
- libxml2 2.9.4+dfsg1-3.1 (bug #870867)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=780691 (not yet public)
NOTE: Android patch: https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
- NOTE: Fix upstream: https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
+ NOTE: Fix upstream: https://gitlab.gnome.org/GNOME/libxml2/-/commit/90ccb58242866b0ba3edbef8fe44214a101c2b3e
CVE-2017-7374 (Use-after-free vulnerability in fs/crypto/ in the Linux kernel before ...)
- linux 4.9.25-1
[jessie] - linux <not-affected> (Vulnerable code not present; Introduced in 4.2-rc1)
@@ -405541,7 +405541,7 @@ CVE-2017-5969 (** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows r
NOTE: https://www.openwall.com/lists/oss-security/2016/11/05/3
NOTE: Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=778519
NOTE: Duplicate upstream bug (contains patch): https://bugzilla.gnome.org/show_bug.cgi?id=758422
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=94691dc884d1a8ada39f073408b4bb92fe7fe882
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/94691dc884d1a8ada39f073408b4bb92fe7fe882
CVE-2017-5968
RESERVED
CVE-2017-5967 (The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIME ...)
@@ -408715,8 +408715,8 @@ CVE-2017-5130 (An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as us
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=783026 (not public)
NOTE: xmlMemoryStrdup is only for debugging with excpetion in xmlint when invoked
NOTE: with --maxmem. Similar issue for xmlMallocLoc and xmlReallocLoc.
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=897dffbae322b46b83f99a607d527058a72c51ed
- NOTE: Needs follow up: https://git.gnome.org/browse/libxml2/commit/?id=ed48d65b4d6c5cec7be035ad5eebeba873b4b955
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/897dffbae322b46b83f99a607d527058a72c51ed
+ NOTE: Needs follow up: https://gitlab.gnome.org/GNOME/libxml2/-/commit/ed48d65b4d6c5cec7be035ad5eebeba873b4b955
CVE-2017-5129 (A use after free in WebAudio in Blink in Google Chrome prior to 62.0.3 ...)
{DSA-4020-1}
- chromium-browser 62.0.3202.75-1
@@ -420252,7 +420252,7 @@ CVE-2017-0663 (A remote code execution vulnerability in libxml2 could enable an
- libxml2 2.9.4+dfsg1-3.1 (bug #870870)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=780228 (not yet public)
NOTE: https://android.googlesource.com/platform/external/libxml2/+/521b88fbb6d18312923f0df653d045384b500ffc
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=92b9e8c8b3787068565a1820ba575d042f9eec66
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/92b9e8c8b3787068565a1820ba575d042f9eec66
CVE-2017-0662
RESERVED
CVE-2017-0661
@@ -422643,11 +422643,11 @@ CVE-2016-9318 (libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier a
[jessie] - libxml2 <ignored> (Minor issue; intrusive to backport)
[wheezy] - libxml2 <no-dsa> (Minor issue)
NOTE: Upstream Bug: https://bugzilla.gnome.org/show_bug.cgi?id=772726
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=2304078555896cf1638c628f50326aeef6f0e0d0
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2304078555896cf1638c628f50326aeef6f0e0d0
NOTE: The patch introduces a new option that can be specified if this
NOTE: behaviour is wanted. Not enforced by default.
- NOTE: The option though was reverted in https://git.gnome.org/browse/libxml2/commit/?id=030b1f7a27c22f9237eddca49ec5e620b6258d7d
- NOTE: New proposed/commited fix: https://git.gnome.org/browse/libxml2/commit/?id=ad88b54f1a28a8565964a370b5d387927b633c0d
+ NOTE: The option though was reverted in https://gitlab.gnome.org/GNOME/libxml2/-/commit/030b1f7a27c22f9237eddca49ec5e620b6258d7d
+ NOTE: New proposed/commited fix: https://gitlab.gnome.org/GNOME/libxml2/-/commit/ad88b54f1a28a8565964a370b5d387927b633c0d
CVE-2016-9317 (The gdImageCreate function in the GD Graphics Library (aka libgd) befo ...)
{DSA-3777-1 DLA-804-1}
- libgd2 2.2.4-1
@@ -436709,8 +436709,8 @@ CVE-2016-5131 (Use-after-free vulnerability in libxml2 through 2.9.4, as used in
[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
- libxml2 2.9.4+dfsg1-2.1 (bug #840554)
NOTE: Google fix: https://codereview.chromium.org/2127493002
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=9ab01a277d71f54d3143c2cf333c5c2e9aaedd9e
- NOTE: Requisite for the test: https://git.gnome.org/browse/libxml2/commit/?id=a005199330b86dada19d162cae15ef9bdcb6baa8
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/9ab01a277d71f54d3143c2cf333c5c2e9aaedd9e
+ NOTE: Requisite for the test: https://gitlab.gnome.org/GNOME/libxml2/-/commit/a005199330b86dada19d162cae15ef9bdcb6baa8
CVE-2016-5130 (content/renderer/history_controller.cc in Google Chrome before 52.0.27 ...)
{DSA-3637-1}
- chromium-browser 52.0.2743.82-1
@@ -438226,7 +438226,7 @@ CVE-2016-4659
CVE-2016-4658 (xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS ...)
{DSA-3744-1 DLA-691-1}
- libxml2 2.9.4+dfsg1-2.1 (bug #840553)
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c1d1f7121194036608bf555f08d3062a36fd344b
CVE-2016-4657 (WebKit in Apple iOS before 9.3.5 allows remote attackers to execute ar ...)
- webkitgtk <removed> (unimportant)
NOTE: https://www.youtube.com/watch?v=xkdPjbaLngE
@@ -438916,19 +438916,19 @@ CVE-2016-4449 (XML external entity (XXE) vulnerability in the xmlStringLenDecode
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=761430
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/b1d34de46a11323fccffa9fadeb33be670d602f5 (v2.9.4)
CVE-2016-4448 (Format string vulnerability in libxml2 before 2.9.4 allows attackers t ...)
- libxml2 2.9.4+dfsg1-1 (bug #829718)
[jessie] - libxml2 <ignored> (Minor impact; too intrusive to backport)
[wheezy] - libxml2 <no-dsa> (Minor impact; too intrusive to backport)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=761029
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9 (v2.9.4)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/4472c3a5a5b516aaf59b89be602fbce52756c3e9 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b (v2.9.4)
CVE-2016-4447 (The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 a ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=759573
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/00906759053986b8079985644172085f74331f83 (v2.9.4)
CVE-2016-4446 (The allow_execstack plugin for setroubleshoot allows local users to ex ...)
NOT-FOR-US: setroubleshoot
CVE-2016-4445 (The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 ...)
@@ -439038,7 +439038,7 @@ CVE-2016-4483 (The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1 (bug #823405)
NOTE: Minor issue, only when using libxml2 using recovery mode
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c97750d11bb8b6f3303e7131fe526a61ac65bcfd (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=766414
CVE-2016-4477 (wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters ...)
{DLA-473-1}
@@ -441043,7 +441043,7 @@ CVE-2016-3706 (Stack-based buffer overflow in the getaddrinfo function in sysdep
CVE-2016-3705 (The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1 (bug #823414)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=8f30bdff69edac9075f4663ce3b56b0c52d48ce6 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8f30bdff69edac9075f4663ce3b56b0c52d48ce6 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=765207
CVE-2016-3704 (Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate pas ...)
NOT-FOR-US: Pulp (Red Hat)
@@ -441382,7 +441382,7 @@ CVE-2016-3616 (The cjpeg utility in libjpeg allows remote attackers to cause a d
CVE-2016-3627 (The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earli ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1 (bug #819006)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bdd66182ef53fe1f7209ab6535fda56366bd7ac9 (v2.9.4)
NOTE: https://www.openwall.com/lists/oss-security/2016/03/21/3
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=762100
CVE-2016-3615 (Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 a ...)
@@ -447269,47 +447269,47 @@ CVE-2016-1841 (libxslt, as used in Apple iOS before 9.3.2, OS X before 10.11.5,
CVE-2016-1840 (Heap-based buffer overflow in the xmlFAParsePosCharGroup function in l ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/cbb271655cadeb8dbb258a64701d9a3a0c4835b4 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=757711
CVE-2016-1839 (The xmlDictAddString function in libxml2 before 2.9.4, as used in Appl ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/a820dbeac29d330bae4be05d9ecd939ad6b4aa33 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=758605
NOTE: https://code.google.com/p/google-security-research/issues/detail?id=637
CVE-2016-1838 (The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4 ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/db07dd613e461df93dde7902c6505629bf0734e9 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=758588
NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=639
CVE-2016-1837 (Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiter ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/11ed4a7a90d5ce156a18980a4ad4e53e77384852 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=760263
CVE-2016-1836 (Use-after-free vulnerability in the xmlDictComputeFastKey function in ...)
{DSA-3593-1}
- libxml2 2.9.3+dfsg1-1.1
[wheezy] - libxml2 <not-affected> (Vulnerable code not present)
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0 (v2.9.4)
- NOTE: Introduced by: https://git.gnome.org/browse/libxml2/commit/?id=dcc19503193c71596278a252064a8ce66331b3cd (v2.9.2)
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/45752d2c334b50016666d8f0ec3691e2d680f0a0 (v2.9.4)
+ NOTE: Introduced by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/dcc19503193c71596278a252064a8ce66331b3cd (v2.9.2)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=759398
NOTE: Regression applies to Jessie, since fix backported as 0007-Fix-a-parsing-bug-on-non-ascii-element-and-CR-LF-usa.patch
CVE-2016-1835 (Use-after-free vulnerability in the xmlSAX2AttributeNs function in lib ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/38eae571111db3b43ffdeb05487c9f60551906fb (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=759020
CVE-2016-1834 (Heap-based buffer overflow in the xmlStrncat function in libxml2 befor ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8fbbf5513d609c1770b391b99e33314cd0742704 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=763071
CVE-2016-1833 (The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76 (v2.9.4)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/0bcd05c5cd83dec3406c8f68b769b1d610c72f76 (v2.9.4)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=758606
CVE-2016-1832 (libc in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1 ...)
NOT-FOR-US: Apple
@@ -447454,7 +447454,7 @@ CVE-2016-1763 (Messages in Apple iOS before 9.3 does not ensure that an auto-fil
CVE-2016-1762 (The xmlNextChar function in libxml2 before 2.9.4 allows remote attacke ...)
{DSA-3593-1 DLA-503-1}
- libxml2 2.9.3+dfsg1-1.1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/a7a94612aa3b16779e2c74e1fa353b5d9786c602
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=759671
CVE-2016-1761 (libxml2 in Apple iOS before 9.3, OS X before 10.11.4, and watchOS befo ...)
NOT-FOR-US: No public details available, probably Apple specific libxml2 changes
@@ -454104,14 +454104,14 @@ CVE-2015-8242 (The xmlSAX2TextNode function in SAX2.c in the push interface in t
[wheezy] - libxml2 <not-affected> (Vulnerable code introduced later)
[squeeze] - libxml2 <not-affected> (Vulnerable code introduced later)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756372
- NOTE: Introduced by: https://git.gnome.org/browse/libxml2/commit/?id=826bc320206f70fccd2941a77d363e95e8076898 (v2.9.2-rc1)
- NOTE: Fixed by: https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2 (v2.9.3)
+ NOTE: Introduced by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/826bc320206f70fccd2941a77d363e95e8076898 (v2.9.2-rc1)
+ NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8fb4a770075628d6441fb17a1e435100e2f3b1a2 (v2.9.3)
CVE-2015-8241 (The xmlNextChar function in libxml2 2.9.2 does not properly check the ...)
{DSA-3430-1 DLA-355-1}
- libxml2 2.9.3+dfsg1-1 (bug #806384)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756263
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
- NOTE: Introduced/Uncovered by https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (fix for CVE-2015-7941)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
+ NOTE: Introduced/Uncovered by https://gitlab.gnome.org/GNOME/libxml2/-/commit/a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (fix for CVE-2015-7941)
NOTE: https://www.openwall.com/lists/oss-security/2015/11/17/5
CVE-2015-8239 (The SHA-2 digest support in the sudoers plugin in sudo after 1.8.7 all ...)
- sudo 1.8.17p1-1 (bug #805563)
@@ -454378,9 +454378,9 @@ CVE-2015-8317 (The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3
{DSA-3430-1 DLA-355-1}
- libxml2 2.9.2+zdfsg1-4
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=751631
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/709a952110e98621c9b78c4f26462a9d8333102e
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=751603
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/9aa37588ee78a06ca1379a9d9356eab16686099c
CVE-2015-XXXX [Kernel: Unprivileged user can freeze journald]
- linux <unfixed> (unimportant)
- linux-2.6 <not-affected> (Vulnerable code not present)
@@ -454677,7 +454677,7 @@ CVE-2015-8035 (The xz_decomp function in xzlib.c in libxml2 2.9.1 does not prope
{DSA-3430-1}
- libxml2 2.9.3+dfsg1-1 (bug #803942)
[squeeze] - libxml2 <not-affected> (No LZMA/XZ support in version 2.7.8)
- NOTE: Upstream patch: https://git.gnome.org/browse/libxml2/commit/?id=f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 (v2.9.3)
+ NOTE: Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 (v2.9.3)
NOTE: You can use "xmllint --version" to verify if libxml2 is compiled with "Lzma" support.
NOTE: sid's 2.9.2+zdfsg1-4 claims to have "Lzma" support but it's broken in fact...
NOTE: so it barfs on the problematic file (parser error : Start tag expected,
@@ -456426,23 +456426,23 @@ CVE-2015-7502 (Red Hat CloudForms 3.2 Management Engine (CFME) 5.4.4 and CloudFo
CVE-2015-7500 (The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows c ...)
{DSA-3430-1 DLA-373-1}
- libxml2 2.9.3+dfsg1-1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/f1063fdbe7fa66332bbb76874101c2a7b51b519f (v2.9.3)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756525 (upstream bug not yet open)
CVE-2015-7499 (Heap-based buffer overflow in the xmlGROW function in parser.c in libx ...)
{DSA-3430-1 DLA-373-1}
- libxml2 2.9.3+dfsg1-1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc (v2.9.3)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/28cd9cb747a94483f4aea7f0968d202c20bb4cfc (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da (v2.9.3)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756479 (upstream bug not yet open)
CVE-2015-7498 (Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c ...)
{DSA-3430-1 DLA-373-1}
- libxml2 2.9.3+dfsg1-1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43 (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/afd27c21f6b36e22682b7da20d726bce2dcb2f43 (v2.9.3)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756527 (upstream bug not yet open)
CVE-2015-7497 (Heap-based buffer overflow in the xmlDictComputeFastQKey function in d ...)
{DSA-3430-1 DLA-373-1}
- libxml2 2.9.3+dfsg1-1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9 (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/6360a31a84efe69d155ed96306b9a931a40beab9 (v2.9.3)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756528 (upstream bug not yet open)
CVE-2015-7496 (GNOME Display Manager (gdm) before 3.18.2 allows physically proximate ...)
- gdm3 3.18.2-1
@@ -462201,7 +462201,7 @@ CVE-2015-5313 (Directory traversal vulnerability in the virStorageBackendFileSys
CVE-2015-5312 (The xmlStringLenDecodeEntities function in parser.c in libxml2 before ...)
{DSA-3430-1 DLA-373-1}
- libxml2 2.9.3+dfsg1-1
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/69030714cde66d525a8884bda01b9e8f0abf8e1e (v2.9.3)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756733 (upstream bug not yet open)
CVE-2015-5311 (PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows rem ...)
- pdns 3.4.7-1
@@ -467813,23 +467813,23 @@ CVE-2015-7942 (The xmlParseConditionalSections function in parser.c in libxml2 d
- libxml2 2.9.3+dfsg1-1 (bug #802827)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=744980#c8
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=756456#c0
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=bd0526e66a56e75a18da8c15c4750db8f801c52d
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=41ac9049a27f52e7a1f3b341f8714149fc88d450
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bd0526e66a56e75a18da8c15c4750db8f801c52d
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/41ac9049a27f52e7a1f3b341f8714149fc88d450
CVE-2015-7941 (libxml2 2.9.2 does not properly stop parsing invalid input, which allo ...)
{DSA-3430-1 DLA-266-1}
- libxml2 2.9.2+really2.9.1+dfsg1-0.1 (bug #783010)
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=744980
NOTE: https://www.openwall.com/lists/oss-security/2015/04/19/5
NOTE: https://www.openwall.com/lists/oss-security/2015/10/22/5
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (v2.9.3)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489 (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 (v2.9.3)
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/9b8512337d14c8ddf662fcb98b0135f225a1c489 (v2.9.3)
CVE-2015-8710 (The htmlParseComment function in HTMLparser.c in libxml2 allows attack ...)
{DSA-3430-1 DLA-266-1}
- libxml2 2.9.2+really2.9.1+dfsg1-0.1 (bug #782985)
NOTE: Added workaround item to reflect entry fixed status, remove once CVE assigned
NOTE: CVE Request: https://www.openwall.com/lists/oss-security/2015/04/19/4
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=746048
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/e724879d964d774df9b7969fc846605aa1bac54c
CVE-2015-3328
RESERVED
CVE-2015-3327
@@ -472557,7 +472557,7 @@ CVE-2015-1820 (REST client for Ruby (aka rest-client) before 1.8.0 allows remote
CVE-2015-1819 (The xmlreader in libxml allows remote attackers to cause a denial of s ...)
{DSA-3430-1 DLA-266-1}
- libxml2 2.9.2+really2.9.1+dfsg1-0.1 (low; bug #782782)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/213f1fe0d76d30eaed6e5853057defc43e6df2c9
NOTE: Concerns by Florian Weimer: https://bugzilla.gnome.org/show_bug.cgi?id=748278
CVE-2015-1818 (XML external entity (XXE) vulnerability in the dashbuilder import faci ...)
NOT-FOR-US: JBoss dashbuilder
@@ -493314,7 +493314,7 @@ CVE-2014-3660 (parser.c in libxml2 before 2.9.2 does not properly prevent entity
[jessie] - libxml2 2.9.1+dfsg1-5
- libxml2 2.9.2+dfsg1-1 (bug #765722)
NOTE: https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=be2a7edaf289c5da74a4f9ed3a0b6c733e775230
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/be2a7edaf289c5da74a4f9ed3a0b6c733e775230
NOTE: Beware the upstream patch relies on other commits not
NOTE: available in the squeeze/wheezy version (at least cff2546f that
NOTE: changes how the ent->checked variable is used and likely a3f1e3e5 too)
@@ -503634,8 +503634,8 @@ CVE-2014-0192 (Foreman 1.4.0 before 1.5.0 does not properly restrict access to p
CVE-2014-0191 (The xmlParserHandlePEReference function in parser.c in libxml2 before ...)
{DSA-2978-2 DLA-151-1}
- libxml2 2.9.1+dfsg1-4 (bug #747309)
- NOTE: The upstream patch we used in DSA-2978-1 and DLA-16-1 is only half of the fix. The other half is likely https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f which is only in libxml 2.9 and newer. This was found out with the test case given in https://github.com/sparklemotion/nokogiri/issues/693#issuecomment-8935085.
- NOTE: First patches: https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df https://git.gnome.org/browse/libxml2/commit/?id=dd8367da17c2948981a51e52c8a6beb445edf825
+ NOTE: The upstream patch we used in DSA-2978-1 and DLA-16-1 is only half of the fix. The other half is likely https://gitlab.gnome.org/GNOME/libxml2/-/commit/4629ee02ac649c27f9c0cf98ba017c6b5526070f which is only in libxml 2.9 and newer. This was found out with the test case given in https://github.com/sparklemotion/nokogiri/issues/693#issuecomment-8935085.
+ NOTE: First patches: https://gitlab.gnome.org/GNOME/libxml2/-/commit/9cd1c3cfbd32655d60572c0a413e017260c854df https://gitlab.gnome.org/GNOME/libxml2/-/commit/dd8367da17c2948981a51e52c8a6beb445edf825
CVE-2014-0190 (The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to c ...)
- qt4-x11 4:4.8.6+dfsg-1 (low)
[wheezy] - qt4-x11 <no-dsa> (Minor issue)
@@ -517384,7 +517384,7 @@ CVE-2013-1970
REJECTED
CVE-2013-1969 (Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly ...)
- libxml2 <not-affected> (Affecting only 2.9.x, see bug #705722)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/de0cc20c29cb3f056062925395e0f68d2250a46f
CVE-2013-1968 (Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authent ...)
{DSA-2703-1}
- subversion 1.7.9-1+nmu2 (bug #711033)
@@ -532798,7 +532798,7 @@ CVE-2012-2808 (The PRNG implementation in the DNS resolver in Bionic in Android
CVE-2012-2807 (Multiple integer overflows in libxml2, as used in Google Chrome before ...)
{DSA-2521-1}
- libxml2 2.8.0+dfsg1-5 (bug #679280)
- NOTE: https://git.gnome.org/browse/libxml2/commit/?id=459eeb9dc752d5185f57ff6b135027f11981a626
+ NOTE: https://gitlab.gnome.org/GNOME/libxml2/-/commit/459eeb9dc752d5185f57ff6b135027f11981a626
CVE-2012-2806 (Heap-based buffer overflow in the get_sos function in jdmarker.c in li ...)
- libjpeg-turbo <not-affected> (Fixed before initial release)
CVE-2012-2805 (Unspecified vulnerability in FFMPEG 0.10 allows remote attackers to ca ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4f40a27689c7162ef47a1146cf09baafbf4579c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a4f40a27689c7162ef47a1146cf09baafbf4579c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230417/14cebc53/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list