Описание
Security update for perl-XML-Parser
This update for perl-XML-Parser fixes the following issues:
- CVE-2006-10002: heap buffer overflow in
parse_streamwhen processing UTF-8 input streams (bsc#1259901). - CVE-2006-10003: off-by-one heap buffer overflow in
st_serial_stack(bsc#1259902).
Список пакетов
openSUSE Leap 16.0
Ссылки
- SUSE Security Ratings
- SUSE Bug 1259901
- SUSE Bug 1259902
- SUSE CVE CVE-2006-10002 page
- SUSE CVE CVE-2006-10003 page
Описание
XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
Затронутые продукты
Ссылки
- CVE-2006-10002
- SUSE Bug 1259901
Описание
XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack. In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer. The bug can be observed when parsing an XML file with very deep element nesting
Затронутые продукты
Ссылки
- CVE-2006-10003
- SUSE Bug 1259902