Processed: Re: [xml/sgml-pkgs] Bug#715531: libxml2: CVE-2013-2877
Processing commands for cont...@bugs.debian.org: > fixed 715531 libxml2/2.9.1+dfsg1-2 Bug #715531 [libxml2] libxml2: CVE-2013-2877 Marked as fixed in versions libxml2/2.9.1+dfsg1-2. > thanks Stopping processing here. Please contact me if you need assistance. -- 715531: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715531 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#715531: [xml/sgml-pkgs] Bug#715531: libxml2: CVE-2013-2877
fixed 715531 libxml2/2.9.1+dfsg1-2 thanks This problem does not exist in 2.9.1, it's some of the last commits that makes up the release of 2.9.1. I'll have a look at wheezy then. -- Regards, Aron Xu -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#715531: libxml2: CVE-2013-2877
Package: libxml2 Severity: grave Tags: security Justification: user security hole http://googlechromereleases.blogspot.de/2013/07/stable-channel-update.html includes: [229019] Low CVE-2013-2877: Out-of-bounds read in XML parsing. Credit to Aki Helin of OUSPG. The commit in Chromium is http://git.chromium.org/gitweb/?p=chromium.git;a=commit;h=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1 The upstream commit in libxml2 is: https://git.gnome.org/browse/libxml2/commit/parser.c?id=e50ba8164eee06461c73cd8abb9b46aa0be81869 Cheers, Moritz -- To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org