Source: libxml2 Version: 2.9.10+dfsg-5 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libxml2. CVE-2020-24977[0]: | GNOME project libxml2 v2.9.10 and earlier have a global Buffer | Overflow vulnerability in xmlEncodeEntitiesInternal at | libxml2/entities.c. The issue has been fixed in commit 8e7c20a1 | (20910-GITv2.9.10-103-g8e7c20a1). Please note that the CVE description looks missleading, because 8e7c20a1 is not the fixing commit, rather [1]. There is some upstream discussion but this appears to be really a issue for xmllint, and as well present before the bisected commit in the upstream issue. That said, it is marked no-dsa for buster still. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-24977 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977 [1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 [2] https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 Please adjust the affected versions in the BTS as needed. Regards, Salvatore