CVE-2015-8317

Published: 23 November 2015

The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.

Priority

Low

Status

Package Release Status
libxml2
Launchpad, Ubuntu, Debian
Upstream
Released (2.9.3)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.9.1+dfsg1-3ubuntu4.6)
Patches:
Upstream: https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
Upstream: https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e

Notes

AuthorNote
mdeslaur
already fixed by the following patches in wily+:
0011-Do-not-process-encoding-values-if-the-declaration-if.patch
0012-Fail-parsing-early-on-if-encoding-conversion-failed.patch

References

Bugs