CVE-2013-1969

Publication date 25 April 2013

Last updated 24 July 2024


Ubuntu priority

Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.

Read the notes from the security team

Status

Package Ubuntu Release Status
libxml2 13.04 raring
Fixed 2.9.0+dfsg1-4ubuntu4.1
12.10 quantal
Not affected
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected

Notes


mdeslaur

only seems to affect 2.9.0+

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libxml2

References

Related Ubuntu Security Notices (USN)

Other references