From ${URL} : Description A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library. The vulnerability is caused due to unspecified error when parsing XML files and can be exploited to cause a crash via specially crafted XML file. Solution: Fixed in the GIT repository. Further details available to Secunia VIM customers Provided and/or discovered by: Aki Helin, OUSPG Original Advisory: Debian bug-tracker: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715531 @maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
This was fixed upstream in libxml2-2.9.1; we need to bump.
Fixed in 2.9.1, which now needs to be tested and stabilized everywhere. @m68k arch maintainers, if you do not have the time to keep up with security stabilizations, please remove your stable keywords and declare that your arch is unstable like mips :/ +*libxml2-2.9.1 (11 Jul 2013) + + 11 Jul 2013; Alexandre Rostovtsev <tetromino@gentoo.org> + libxml2-2.8.0-r3.ebuild, -libxml2-2.8.0-r4.ebuild, -libxml2-2.9.0-r1.ebuild, + +libxml2-2.9.1.ebuild, +files/libxml2-2.9.1-compression-detection.patch, + +files/libxml2-2.9.1-missing-break.patch, + +files/libxml2-2.9.1-non-ascii-cr-lf.patch, + +files/libxml2-2.9.1-python-2.6.patch, +files/libxml2-2.9.1-python3.patch: + Version bump. Fixes denial-of-service vulnerability (bug #476438, + CVE-2013-2877, thanks to Agostino Sarubbo). Drop old versions, except for + 2.8.0-r3 which for some reason was the only revision keyworded stable on + m68k.
Arches, please test and mark stable: =dev-libs/libxml2-2.9.1 Target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
Stable for HPPA.
For arches that haven't stabilized 2.9.1 yet, I suggest changing the stabilization target to =libxml2-2.9.1-r1 since it includes a fix for bug #476586
amd64 stable
x86 stable
ppc stable
ppc64 stable
alpha stable
arm stable
ia64 stable
sh stable
sparc stable
s390 stable
GLSA request filed.
CVE-2013-2877 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877): parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
This issue was resolved and addressed in GLSA 201311-06 at http://security.gentoo.org/glsa/glsa-201311-06.xml by GLSA coordinator Sean Amoss (ackle).