Source: libxml2 Version: 2.9.14+dfsg-1.3 Severity: important Tags: security upstream Forwarded: https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for libxml2. CVE-2023-39615[0]: | Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer | overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. | This vulnerability allows attackers to cause a Denial of Service | (DoS) via supplying a crafted XML file. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-39615 https://www.cve.org/CVERecord?id=CVE-2023-39615 [1] https://gitlab.gnome.org/GNOME/libxml2/-/issues/535 Please adjust the affected versions in the BTS as needed. Regards, Salvatore