[Secure-testing-team] Bug#782985: libxml2: parsing an unclosed comment can result in `Conditional jump or move depends on uninitialised value(s)` and unsafe memory access
Salvatore Bonaccorso
carnil at debian.org
Mon Apr 20 06:40:51 UTC 2015
Source: libxml2
Version: 2.9.2+dfsg1-3
Severity: important
Tags: security upstream
Hi
See http://www.openwall.com/lists/oss-security/2015/04/19/4 and
https://bugzilla.gnome.org/show_bug.cgi?id=746048 .
(There is no CVE assigned yet.)
Could you adjust the affected version in the BTS? I only verified the
issue in unstable.
Regards,
Salvatore
More information about the Secure-testing-team
mailing list