New issue
Advanced search Search tips

Issue 843971 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: May 2018
Cc:
EstimatedDays: ----
NextAction: ----
OS: Linux , Android , Windows , iOS , Chrome , Mac , Fuchsia
Pri: 2
Type: Bug-Security



Sign in to add a comment

Chromium: Vulnerability reported in libxml

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, May 17 2018

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: libxml
Package Version: [cpe:/a:xmlsoft:libxml2:2.7.7]

Advisory: CVE-2017-18258
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-18258
  CVSS severity score: 4.3/10.0
  Confidence: high
  Description:

The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.


 
Cc: dcheng@chromium.org scottmg@chromium.org
Labels: OS-Android OS-Chrome OS-Fuchsia OS-iOS OS-Linux OS-Mac OS-Windows
libXML owners: Does it sound reasonable to WontFix this since we don't consider DoS a security issue and the DoS isn't caused by memory corruption.
Status: WontFix (was: Unconfirmed)

Comment 3 by vapier@chromium.org, May 21 2018

we'd still want to fix it even if it wasn't security oriented.

that said, in at least CrOS, we've been using 2.9.6 since at least R66.
Project Member

Comment 4 by sheriffbot@chromium.org, Aug 25

Labels: -Restrict-View-SecurityTeam allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment