Gentoo Archives: gentoo-commits

From: "Sean Amoss (ackle)" <ackle@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo commit in xml/htdocs/security/en/glsa: glsa-201202-09.xml
Date: Wed, 29 Feb 2012 20:11:55
Message-Id: 20120229201137.F0D7F2004B@flycatcher.gentoo.org
1 ackle 12/02/29 20:11:37
2
3 Added: glsa-201202-09.xml
4 Log:
5 GLSA 201202-09
6
7 Revision Changes Path
8 1.1 xml/htdocs/security/en/glsa/glsa-201202-09.xml
9
10 file : http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201202-09.xml?rev=1.1&view=markup
11 plain: http://sources.gentoo.org/viewvc.cgi/gentoo/xml/htdocs/security/en/glsa/glsa-201202-09.xml?rev=1.1&content-type=text/plain
12
13 Index: glsa-201202-09.xml
14 ===================================================================
15 <?xml version="1.0" encoding="UTF-8"?>
16 <?xml-stylesheet type="text/xsl" href="/xsl/glsa.xsl"?>
17 <?xml-stylesheet type="text/xsl" href="/xsl/guide.xsl"?>
18 <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
19 <glsa id="201202-09">
20 <title>libxml2: User-assisted execution of arbitrary code</title>
21 <synopsis>A boundary error in libxml2 could result in execution of arbitrary
22 code or Denial of Service.
23 </synopsis>
24 <product type="ebuild">libxml2</product>
25 <announced>February 29, 2012</announced>
26 <revised>February 29, 2012: 2</revised>
27 <bug>398361</bug>
28 <access>remote</access>
29 <affected>
30 <package name="dev-libs/libxml2" auto="yes" arch="*">
31 <unaffected range="ge">2.7.8-r4</unaffected>
32 <vulnerable range="lt">2.7.8-r4</vulnerable>
33 </package>
34 </affected>
35 <background>
36 <p>libxml2 is the XML C parser and toolkit developed for the Gnome project.</p>
37 </background>
38 <description>
39 <p>The "xmlStringLenDecodeEntities()" function in parser.c contains a
40 boundary error which could possibly cause a heap-based buffer overflow.
41 </p>
42 </description>
43 <impact type="normal">
44 <p>A remote attacker could entice a user to open a specially crafted XML
45 file in an application linked against libxml2, possibly resulting in the
46 remote execution of arbitrary code with the permissions of the user
47 running the application, or Denial of Service.
48 </p>
49 </impact>
50 <workaround>
51 <p>There is no known workaround at this time.</p>
52 </workaround>
53 <resolution>
54 <p>All libxml2 users should upgrade to the latest version:</p>
55
56 <code>
57 # emerge --sync
58 # emerge --ask --oneshot --verbose "&gt;=dev-libs/libxml2-2.7.8-r4"
59 </code>
60
61 <p>Packages which depend on this library may need to be recompiled. Tools
62 such as revdep-rebuild may assist in identifying some of these packages.
63 </p>
64 </resolution>
65 <references>
66 <uri link="http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3919">CVE-2011-3919</uri>
67 </references>
68 <metadata timestamp="Mon, 16 Jan 2012 09:34:21 +0000" tag="requester">ago</metadata>
69 <metadata timestamp="Wed, 29 Feb 2012 20:10:19 +0000" tag="submitter">ackle</metadata>
70 </glsa>