[go: up one dir, main page]

Bug 957110 (CVE-2015-7500) - VUL-1: CVE-2015-7500: libxml2: Fix memory access error due to incorrect entities boundaries
Summary: VUL-1: CVE-2015-7500: libxml2: Fix memory access error due to incorrect entit...
Status: RESOLVED FIXED
Alias: CVE-2015-7500
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Deadline: 2016-01-22
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/159193/
Whiteboard: CVSSv2:RedHat:CVE-2015-7500:4.3:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-11-30 10:05 UTC by Alexander Bergmann
Modified: 2016-01-22 09:20 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2015-11-30 10:05:34 UTC
CVE-2015-7500 Fix memory access error due to incorrect entities boundaries

For https://bugzilla.gnome.org/show_bug.cgi?id=756525 handle properly the case where we popped out of the current entity while processing a start tag Reported by Kostya Serebryany @ Google This slightly modifies the output of 754946 in regression tests

https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f


References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7500
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7500.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500
https://bugzilla.gnome.org/show_bug.cgi?id=756525
Comment 1 SMASH SMASH 2015-11-30 12:18:00 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Dec. 14, 2015".

When done, reassign the bug to "security-team@suse.de".
/update/121058/.
Comment 2 Swamp Workflow Management 2015-11-30 23:00:41 UTC
bugbot adjusting priority
Comment 4 Bernhard Wiedemann 2015-12-17 14:02:19 UTC
This is an autogenerated message for OBS integration:
This bug (957110) was mentioned in
https://build.opensuse.org/request/show/349390 13.2+13.1 / libxml2
Comment 6 Swamp Workflow Management 2015-12-27 00:14:57 UTC
openSUSE-SU-2015:2372-1: An update that fixes 14 vulnerabilities is now available.

Category: security (moderate)
Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110
CVE References: CVE-2014-0191,CVE-2014-3660,CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317
Sources used:
openSUSE 13.2 (src):    libxml2-2.9.3-7.4.1, python-libxml2-2.9.3-7.4.1
openSUSE 13.1 (src):    libxml2-2.9.3-2.19.1, python-libxml2-2.9.3-2.19.1
Comment 7 Swamp Workflow Management 2016-01-05 14:26:52 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2016-01-19.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62411
Comment 8 Swamp Workflow Management 2016-01-05 19:13:28 UTC
SUSE-SU-2016:0030-1: An update that fixes 11 vulnerabilities is now available.

Category: security (moderate)
Bug References: 928193,951734,951735,956018,956021,956260,957105,957106,957107,957109,957110
CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src):    libxml2-2.7.6-0.34.1
SUSE Linux Enterprise Software Development Kit 11-SP3 (src):    libxml2-2.7.6-0.34.1
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Server 11-SP4 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Server 11-SP3 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Desktop 11-SP4 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Desktop 11-SP3 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
Comment 9 Swamp Workflow Management 2016-01-07 16:14:49 UTC
SUSE-SU-2016:0049-1: An update that fixes 12 vulnerabilities is now available.

Category: security (moderate)
Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110
CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP1 (src):    libxml2-2.9.1-13.1
SUSE Linux Enterprise Software Development Kit 12 (src):    libxml2-2.9.1-13.1
SUSE Linux Enterprise Server 12-SP1 (src):    libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
SUSE Linux Enterprise Server 12 (src):    libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
SUSE Linux Enterprise Desktop 12 (src):    libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
Comment 10 SMASH SMASH 2016-01-08 15:03:12 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Jan. 22, 2016".

When done, reassign the bug to "security-team@suse.de".
/update/121235/.
Comment 11 Swamp Workflow Management 2016-01-08 15:06:41 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2016-01-22.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62418
Comment 12 SMASH SMASH 2016-01-08 15:07:56 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Jan. 22, 2016".

When done, reassign the bug to "security-team@suse.de".
/update/62418/.
Comment 13 Swamp Workflow Management 2016-01-13 17:14:34 UTC
openSUSE-SU-2016:0106-1: An update that fixes 12 vulnerabilities is now available.

Category: security (moderate)
Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110
CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317
Sources used:
openSUSE Leap 42.1 (src):    libxml2-2.9.1-10.1, python-libxml2-2.9.1-10.1
Comment 14 Andreas Stieger 2016-01-22 09:20:39 UTC
All done, closing