Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 31 Dec 2015 16:13:50 -0500 (EST)
From: cve-assign@...re.org
To: carnil@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: libxml2 issue: out-of-bounds memory access when parsing an unclosed HTML comment

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

>> https://hackerone.com/reports/57125#activity-384861

>> This is an out-of-bounds memory access in libxml2. By entering a unclosed
>> html comment such as <!-- the libxml2 parser didn't stop parsing at the end
>> of the buffer, causing random memory to be included in the parsed comment
>> that was returned to ruby. In Shopify, this caused ruby objects from
>> previous http requests to be disclosed in the rendered page.

>> https://bugzilla.gnome.org/show_bug.cgi?id=746048

>>> https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c

Use CVE-2015-8710 for this 746048 issue.


> TTBOMK, this and as well
> http://www.openwall.com/lists/oss-security/2015/04/19/5 has a pending
> CVE assignment request.

We don't think that one is pending. It was about 744980, covered in the
http://www.openwall.com/lists/oss-security/2015/10/22/8 post.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=g9Mv
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.