SB2015112808 - Buffer overflow in libxml2 (Alpine package)
Published: November 28, 2015
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2015-7942)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=0215e6588cf7cdc9ec3c57926af82e79b8366e46
- https://git.alpinelinux.org/aports/commit/?id=9e3ec8396214f0ec09a2b5c75e65bbc808013c84
- https://git.alpinelinux.org/aports/commit/?id=f084c470893c32a5ab1b765dfe1fa044af19320d
- https://git.alpinelinux.org/aports/commit/?id=d43279c37e7c6a85eb14e2879d00bb7d74e9aa45