Name | CVE-2015-8035 |
Description | The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3430-1 |
Debian Bugs | 803942 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libxml2 (PTS) | bullseye | 2.9.10+dfsg-6.7+deb11u4 | fixed |
| bullseye (security) | 2.9.10+dfsg-6.7+deb11u5 | fixed |
| bookworm | 2.9.14+dfsg-1.3~deb12u1 | fixed |
| trixie | 2.12.7+dfsg+really2.9.14-0.1 | fixed |
| sid | 2.12.7+dfsg+really2.9.14-0.2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - libxml2 <not-affected> (No LZMA/XZ support in version 2.7.8)
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 (v2.9.3)
You can use "xmllint --version" to verify if libxml2 is compiled with "Lzma" support.
sid's 2.9.2+zdfsg1-4 claims to have "Lzma" support but it's broken in fact...
so it barfs on the problematic file (parser error : Start tag expected,
'<' not found) even though it does not have the fix yet. The next upstream
release will fix this issue and will restore XZ support.
https://www.openwall.com/lists/oss-security/2015/11/02/2