Bugzilla – Bug 957107
VUL-1: CVE-2015-7498: libxml2: processes entities after encoding conversion failures
Last modified: 2016-01-22 09:21:06 UTC
CVE-2015-7498 Avoid processing entities after encoding conversion failures For https://bugzilla.gnome.org/show_bug.cgi?id=756527 and was also raised by Chromium team in the past When we hit a convwersion failure when switching encoding it is bestter to stop parsing there, this was treated as a fatal error but the parser was continuing to process to extract more errors, unfortunately that makes little sense as the data is obviously corrupt and can potentially lead to unexpected behaviour. https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43 References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7498 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7498.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498 https://bugzilla.gnome.org/show_bug.cgi?id=756527
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Dec. 14, 2015". When done, reassign the bug to "security-team@suse.de". /update/121058/.
bugbot adjusting priority
This is an autogenerated message for OBS integration: This bug (957107) was mentioned in https://build.opensuse.org/request/show/349390 13.2+13.1 / libxml2
openSUSE-SU-2015:2372-1: An update that fixes 14 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2014-0191,CVE-2014-3660,CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: openSUSE 13.2 (src): libxml2-2.9.3-7.4.1, python-libxml2-2.9.3-7.4.1 openSUSE 13.1 (src): libxml2-2.9.3-2.19.1, python-libxml2-2.9.3-2.19.1
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-19. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62411
SUSE-SU-2016:0030-1: An update that fixes 11 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): libxml2-2.7.6-0.34.1 SUSE Linux Enterprise Software Development Kit 11-SP3 (src): libxml2-2.7.6-0.34.1 SUSE Linux Enterprise Server for VMWare 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Server 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Server 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Desktop 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Desktop 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Debuginfo 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE-SU-2016:0049-1: An update that fixes 12 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): libxml2-2.9.1-13.1 SUSE Linux Enterprise Software Development Kit 12 (src): libxml2-2.9.1-13.1 SUSE Linux Enterprise Server 12-SP1 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Server 12 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Desktop 12-SP1 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Desktop 12 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 22, 2016". When done, reassign the bug to "security-team@suse.de". /update/121235/.
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 22, 2016". When done, reassign the bug to "security-team@suse.de". /update/62418/.
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-22. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62418
openSUSE-SU-2016:0106-1: An update that fixes 12 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: openSUSE Leap 42.1 (src): libxml2-2.9.1-10.1, python-libxml2-2.9.1-10.1
All done, closing