Bugzilla – Bug 956021
VUL-1: CVE-2015-8242: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode
Last modified: 2016-01-22 09:19:15 UTC
rh#1281950 Stack-based buffer overread vulnerability with HTML parser in push mode in xmlSAX2TextNode. Details (including reproducer): https://bugzilla.gnome.org/show_bug.cgi?id=756372 References: https://bugzilla.redhat.com/show_bug.cgi?id=1281950 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8242 http://seclists.org/oss-sec/2015/q4/328 http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8242.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242
bugbot adjusting priority
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Dec. 14, 2015". When done, reassign the bug to "security-team@suse.de". /update/121058/.
This is an autogenerated message for OBS integration: This bug (956021) was mentioned in https://build.opensuse.org/request/show/349390 13.2+13.1 / libxml2
openSUSE-SU-2015:2372-1: An update that fixes 14 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2014-0191,CVE-2014-3660,CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: openSUSE 13.2 (src): libxml2-2.9.3-7.4.1, python-libxml2-2.9.3-7.4.1 openSUSE 13.1 (src): libxml2-2.9.3-2.19.1, python-libxml2-2.9.3-2.19.1
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-19. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62411
SUSE-SU-2016:0030-1: An update that fixes 11 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): libxml2-2.7.6-0.34.1 SUSE Linux Enterprise Software Development Kit 11-SP3 (src): libxml2-2.7.6-0.34.1 SUSE Linux Enterprise Server for VMWare 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Server 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Server 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Desktop 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Desktop 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4 SUSE Linux Enterprise Debuginfo 11-SP3 (src): libxml2-2.7.6-0.34.1, libxml2-python-2.7.6-0.34.4
SUSE-SU-2016:0049-1: An update that fixes 12 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): libxml2-2.9.1-13.1 SUSE Linux Enterprise Software Development Kit 12 (src): libxml2-2.9.1-13.1 SUSE Linux Enterprise Server 12-SP1 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Server 12 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Desktop 12-SP1 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1 SUSE Linux Enterprise Desktop 12 (src): libxml2-2.9.1-13.1, python-libxml2-2.9.1-13.1
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 22, 2016". When done, reassign the bug to "security-team@suse.de". /update/121235/.
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-01-22. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62418
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 22, 2016". When done, reassign the bug to "security-team@suse.de". /update/62418/.
openSUSE-SU-2016:0106-1: An update that fixes 12 vulnerabilities is now available. Category: security (moderate) Bug References: 928193,951734,951735,954429,956018,956021,956260,957105,957106,957107,957109,957110 CVE References: CVE-2015-1819,CVE-2015-5312,CVE-2015-7497,CVE-2015-7498,CVE-2015-7499,CVE-2015-7500,CVE-2015-7941,CVE-2015-7942,CVE-2015-8035,CVE-2015-8241,CVE-2015-8242,CVE-2015-8317 Sources used: openSUSE Leap 42.1 (src): libxml2-2.9.1-10.1, python-libxml2-2.9.1-10.1
All done, closing