Source: lexbor
Version: 2.6.0-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for lexbor.

CVE-2026-29078[0]:
| Lexbor is a web browser engine library. Prior to 2.7.0, the
| ISO‑2022‑JP encoder in Lexbor fails to reset the temporary size
| variable between iterations. The statement ctx->buffer_used -= size
| with a stale size = 3 causes an integer underflow that wraps to
| SIZE_MAX. Afterwards, memcpy is called with a negative length,
| leading to an out‑of‑bounds read from the stack and an out‑of‑bounds
| write to the heap. The source data is partially controllable via the
| contents of the DOM tree. This vulnerability is fixed in 2.7.0.


CVE-2026-29079[1]:
| Lexbor is a web browser engine library. Prior to 2.7.0, a
| type‑confusion vulnerability exists in Lexbor’s HTML fragment
| parser. When ns = UNDEF, a comment is created using the “unknown
| element” constructor. The comment’s data are written into the
| element’s fields via an unsafe cast, corrupting the qualified_name
| field. That corrupted value is later used as a pointer and
| dereferenced near the zero page. This vulnerability is fixed in
| 2.7.0.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-29078
    https://www.cve.org/CVERecord?id=CVE-2026-29078
    https://github.com/lexbor/lexbor/security/advisories/GHSA-mrwr-xh7f-96v3
[1] https://security-tracker.debian.org/tracker/CVE-2026-29079
    https://www.cve.org/CVERecord?id=CVE-2026-29079
    https://github.com/lexbor/lexbor/security/advisories/GHSA-mrpr-v36q-2vp8

Regards,
Salvatore

Reply via email to