blob: 07980f14cb89940c78fa979b5204c6cb203034e3 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200812-06">
<title>libxml2: Multiple vulnerabilities</title>
Multiple vulnerabilities in libxml2 might lead to execution of arbitrary
code or Denial of Service.
<product type="ebuild">libxml2</product>
<announced>December 02, 2008</announced>
<revised>December 02, 2008: 01</revised>
<package name="dev-libs/libxml2" auto="yes" arch="*">
<unaffected range="ge">2.7.2-r1</unaffected>
<vulnerable range="lt">2.7.2-r1</vulnerable>
libxml2 is the XML (eXtended Markup Language) C parser and toolkit
initially developed for the Gnome project.
Multiple vulnerabilities were reported in libxml2:
Andreas Solberg reported that libxml2 does not properly detect
recursion during entity expansion in an attribute value
A heap-based buffer overflow has been reported in the
xmlParseAttValueComplex() function in parser.c (CVE-2008-3529).
Christian Weiske reported that predefined entity definitions in
entities are not properly handled (CVE-2008-4409).
Drew Yao of Apple Product Security reported an integer overflow in the
xmlBufferResize() function that can lead to an infinite loop
Drew Yao of Apple Product Security reported an integer overflow in the
xmlSAX2Characters() function leading to a memory corruption
<impact type="normal">
A remote attacker could entice a user or automated system to open a
specially crafted XML document with an application using libxml2,
possibly resulting in the exeution of arbitrary code or a high CPU and
memory consumption.
There is no known workaround at this time.
All libxml2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=dev-libs/libxml2-2.7.2-r1&quot;</code>
<uri link="">CVE-2008-3281</uri>
<uri link="">CVE-2008-3529</uri>
<uri link="">CVE-2008-4409</uri>
<uri link="">CVE-2008-4225</uri>
<uri link="">CVE-2008-4226</uri>
<metadata tag="requester" timestamp="Wed, 01 Oct 2008 21:27:07 +0000">
<metadata tag="submitter" timestamp="Fri, 31 Oct 2008 00:21:31 +0000">
<metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:21:45 +0000">