blob: 2c8fd240cd6794a1073b838b63ad1877cda69b62 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200801-20">
<title>libxml2: Denial of Service</title>
A Denial of Service vulnerability has been reported in libxml2.
<product type="ebuild">libxml2</product>
<announced>January 30, 2008</announced>
<revised>January 30, 2008: 01</revised>
<package name="dev-libs/libxml2" auto="yes" arch="*">
<unaffected range="ge">2.6.30-r1</unaffected>
<vulnerable range="lt">2.6.30-r1</vulnerable>
libxml2 is the XML (eXtended Markup Language) C parser and toolkit
initially developed for the Gnome project.
Brad Fitzpatrick reported that the xmlCurrentChar() function does not
properly handle some UTF-8 multibyte encodings.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted XML
document with an application using libxml2, possibly resulting in a
high CPU consumption. Note that this vulnerability could also be
triggered without user interaction by an automated system processing
XML content.
There is no known workaround at this time.
All libxml2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.6.30-r1&quot;</code>
<uri link="">CVE-2007-6284</uri>
<metadata tag="requester" timestamp="Sat, 12 Jan 2008 01:14:43 +0000">
<metadata tag="submitter" timestamp="Mon, 28 Jan 2008 19:48:32 +0000">
<metadata tag="bugReady" timestamp="Mon, 28 Jan 2008 19:48:45 +0000">