Eygene Ryabinkin
2008-Nov-19 12:50 UTC
ports/128998: [vuxml] document vulnerabilities in textproc/libxml2
>Number: 128998 >Category: ports >Synopsis: [vuxml] document vulnerabilities in textproc/libxml2 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 19 20:50:01 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 7.1-PRERELEASE i386 >Organization:Code Labs>Environment:System: FreeBSD 7.1-PRERELEASE i386>Description:The fix for the CVE-2008-4225 and CVE-2008-4226 was commited to the textproc/libxml2 just an hour ago, but vulnerabilities seem to be left undocumented. At least I was not able to find the corresponding PR and reporting channels are not clear from the commit comment.>How-To-Repeat:http://secunia.com/Advisories/32773/ http://www.freebsd.org/cgi/cvsweb.cgi/ports/textproc/libxml2/Makefile>Fix:The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- <vuln vid="unknown"> <topic>libxml2 -- two integer overflow vulnerabilities</topic> <affects> <package> <name>libxml2</name> <range><lt>2.6.32_2</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>Secunia reports:</p> <blockquote cite="http://secunia.com/Advisories/32773/"> <p>Two vulnerabilities have been reported in Libxml2, which can be exploited by malicious people to cause a Denial of Service or to potentially compromise an application using the library.</p> <ol> <li>An integer overflow error in the “xmlSAX2Characters()” function can be exploited to trigger a memory corruption via a specially crafted XML file. Successful exploitation may allow execution of arbitrary code, but requires e.g. that the user is tricked into processing an overly large XML file (2GB or more).</li> <li>An integer overflow error in the “xmlBufferResize()” function can be exploited to trigger the execution of an infinite loop.</li> </ol> </blockquote> </body> </description> <references> <cvename>CVE-2008-4225</cvename> <cvename>CVE-2008-4226</cvename> <url>http://secunia.com/Advisories/32773/</url> <url>https://bugzilla.redhat.com/show_bug.cgi?id=470466</url> <url>https://bugzilla.redhat.com/show_bug.cgi?id=470480</url> </references> <dates> <discovery>2008-11-07</discovery> </dates> </vuln> --- vuln.xml ends here --->Release-Note: >Audit-Trail: >Unformatted:
edwin@FreeBSD.org
2008-Nov-19 13:05 UTC
ports/128998: [vuxml] document vulnerabilities in textproc/libxml2
Synopsis: [vuxml] document vulnerabilities in textproc/libxml2 Responsible-Changed-From-To: freebsd-ports-bugs->gnome Responsible-Changed-By: edwin Responsible-Changed-When: Wed Nov 19 20:50:17 UTC 2008 Responsible-Changed-Why: Over to maintainer (via the GNATS Auto Assign Tool) http://www.freebsd.org/cgi/query-pr.cgi?pr=128998
Eygene Ryabinkin
2008-Nov-19 14:04 UTC
ports/128998: [vuxml] document vulnerabilities in textproc/libxml2
Wed, Nov 19, 2008 at 11:41:01PM +0300, Eygene Ryabinkin wrote:> The fix for the CVE-2008-4225 and CVE-2008-4226 was commited to the > textproc/libxml2 just an hour ago, but vulnerabilities seem to be left > undocumented. At least I was not able to find the corresponding PR and > reporting channels are not clear from the commit comment.The entry was added shortly after this PR by tabthorpe@, so I think that this PR can be closed now. -- Eygene _ ___ _.--. # \`.|\..----...-'` `-._.-'_.-'` # Remember that it is hard / ' ` , __.--' # to read the on-line manual )/' _/ \ `-_, / # while single-stepping the kernel. `-'" `"\_ ,_.-;_.-\_ ', fsc/as # _.-'_./ {_.' ; / # -- FreeBSD Developers handbook {_.-``-' {_/ # -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 195 bytes Desc: not available Url : http://lists.freebsd.org/pipermail/freebsd-security/attachments/20081119/742fa030/attachment.pgp
pluknet
2008-Nov-19 15:15 UTC
ports/128998: [vuxml] document vulnerabilities in textproc/libxml2
2008/11/19 <edwin@freebsd.org>:> Synopsis: [vuxml] document vulnerabilities in textproc/libxml2 > > Responsible-Changed-From-To: freebsd-ports-bugs->gnome > Responsible-Changed-By: edwin > Responsible-Changed-When: Wed Nov 19 20:50:17 UTC 2008 > Responsible-Changed-Why: > Over to maintainer (via the GNATS Auto Assign Tool) > > http://www.freebsd.org/cgi/query-pr.cgi?pr=128998 >Committed as r1.1758 and it can be closed.
linimon@FreeBSD.org
2008-Nov-19 15:42 UTC
ports/128998: [vuxml] document vulnerabilities in textproc/libxml2
Synopsis: [vuxml] document vulnerabilities in textproc/libxml2 State-Changed-From-To: open->closed State-Changed-By: linimon State-Changed-When: Wed Nov 19 22:07:06 UTC 2008 State-Changed-Why: Already committed. http://www.freebsd.org/cgi/query-pr.cgi?pr=128998