tag | c41fcb5c6e928a91dd4b29225b866baee7f687a7 | |
---|---|---|
tagger | Daniel Veillard <veillard@redhat.com> | Tue Nov 03 15:34:09 2015 +0800 |
object | f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 |
Fix for CVE-2015-8035
commit | f0709e3ca8f8947f2d91ed34e92e38a4c23eae63 | [log] [tgz] |
---|---|---|
author | Daniel Veillard <veillard@redhat.com> | Tue Nov 03 15:31:25 2015 +0800 |
committer | Daniel Veillard <veillard@redhat.com> | Tue Nov 03 15:31:25 2015 +0800 |
tree | 08b743f6f7ebe217a8ae57ef3e631aa0b968e0eb | |
parent | e724879d964d774df9b7969fc846605aa1bac54c [diff] |
CVE-2015-8035 Fix XZ compression support loop For https://bugzilla.gnome.org/show_bug.cgi?id=757466 DoS when parsing specially crafted XML document if XZ support is compiled in (which wasn't the case for 2.9.2 and master since Nov 2013, fixed in next commit !)