libxml2: Denial of Service
Gentoo Linux Security Advisory
||GLSA 200801-20 / libxml2
||January 30, 2008
||January 30, 2008: 01
All supported architectures
A Denial of Service vulnerability has been reported in libxml2.
libxml2 is the XML (eXtended Markup Language) C parser and toolkit
initially developed for the Gnome project.
Brad Fitzpatrick reported that the xmlCurrentChar() function does not
properly handle some UTF-8 multibyte encodings.
A remote attacker could entice a user to open a specially crafted XML
document with an application using libxml2, possibly resulting in a
high CPU consumption. Note that this vulnerability could also be
triggered without user interaction by an automated system processing
There is no known workaround at this time.
All libxml2 users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.30-r1"