CVE-2015-8035

NameCVE-2015-8035
DescriptionThe xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-3430-1
Debian Bugs803942

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)bullseye2.9.10+dfsg-6.7+deb11u4fixed
bullseye (security)2.9.10+dfsg-6.7+deb11u5fixed
bookworm2.9.14+dfsg-1.3~deb12u1fixed
trixie2.12.7+dfsg+really2.9.14-0.1fixed
sid2.12.7+dfsg+really2.9.14-0.2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcesqueeze(not affected)
libxml2sourcewheezy2.8.0+dfsg1-7+wheezy5DSA-3430-1
libxml2sourcejessie2.9.1+dfsg1-5+deb8u1DSA-3430-1
libxml2source(unstable)2.9.3+dfsg1-1803942

Notes

[squeeze] - libxml2 <not-affected> (No LZMA/XZ support in version 2.7.8)
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 (v2.9.3)
You can use "xmllint --version" to verify if libxml2 is compiled with "Lzma" support.
sid's 2.9.2+zdfsg1-4 claims to have "Lzma" support but it's broken in fact...
so it barfs on the problematic file (parser error : Start tag expected,
'<' not found) even though it does not have the fix yet. The next upstream
release will fix this issue and will restore XZ support.
https://www.openwall.com/lists/oss-security/2015/11/02/2

Search for package or bug name: Reporting problems