Source: mxml
Version: 4.0.4-3
Severity: important
Tags: security upstream
Forwarded: https://github.com/michaelrsweet/mxml/issues/350
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for mxml.

CVE-2026-5037[0]:
| A vulnerability was determined in mxml up to 4.0.4. This issue
| affects the function index_sort of the file mxml-index.c of the
| component mxmlIndexNew. Executing a manipulation of the argument
| tempr can lead to stack-based buffer overflow. The attack is
| restricted to local execution. The exploit has been publicly
| disclosed and may be utilized. This patch is called
| 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied
| to remediate this issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-5037
    https://www.cve.org/CVERecord?id=CVE-2026-5037
[1] https://github.com/michaelrsweet/mxml/issues/350
[2] 
https://github.com/michaelrsweet/mxml/commit/6e27354466092a1ac65601e01ce6708710bb9fa5

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to