libxml2: Denial of Service
Gentoo Linux Security Advisory
||GLSA 201009-07 / libxml2
||September 21, 2010
||September 21, 2010: 01
All supported architectures
Multiple Denial of Services vulnerabilities were found in libxml2.
libxml2 is a library to manipulate XML files.
The following vulnerabilities were reported after a test with the
Codenomicon XML fuzzing framework:
Two use-after-free vulnerabilities are possible when parsing a XML file
with Notation or Enumeration attribute types (CVE-2009-2416).
A stack consumption vulnerability can be triggered via a large depth of
element declarations in a DTD, related to a function recursion
A remote attacker could entice a user or automated system to open a
specially crafted XML document with an application using libxml2
resulting in a Denial of Service condition.
There is no known workaround at this time.
All libxml2 users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.3-r2"
NOTE: This is a legacy GLSA. Updates for all affected architectures are
available since August 30, 2009. It is likely that your system is
already no longer affected by this issue.