Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2015-8317

Published: 23 November 2015

The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.

Notes

AuthorNote
mdeslaur
already fixed by the following patches in wily+:
0011-Do-not-process-encoding-values-if-the-declaration-if.patch
0012-Fail-parsing-early-on-if-encoding-conversion-failed.patch

Priority

Low

Status

Package Release Status
libxml2
Launchpad, Ubuntu, Debian
vivid
Released (2.9.2+dfsg1-3ubuntu0.2)
upstream
Released (2.9.3)
precise
Released (2.7.8.dfsg-5.1ubuntu4.13)
trusty
Released (2.9.1+dfsg1-3ubuntu4.6)
wily Not vulnerable
(2.9.2+zdfsg1-4ubuntu0.1)
Patches:
upstream: https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
upstream: https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e