CVE-2012-2807

Priority
Medium
Description
Multiple integer overflows in libxml2, as used in Google Chrome before
20.0.1132.43 and other products, on 64-bit Linux platforms allow remote
attackers to cause a denial of service or possibly have unspecified other
impact via unknown vectors.
References
Bugs
Package
Upstream:released (2.8.0+dfsg1-5)
Ubuntu 8.04 LTS (Hardy Heron):released (2.6.31.dfsg-2ubuntu1.10)
Ubuntu 10.04 LTS (Lucid Lynx):released (2.7.6.dfsg-1ubuntu1.6)
Ubuntu 11.10 (Oneiric Ocelot):released (2.7.8.dfsg-4ubuntu0.4)
Ubuntu 12.04 LTS (Precise Pangolin):released (2.7.8.dfsg-5.1ubuntu4.2)
Ubuntu 12.10 (Quantal Quetzal):not-affected (2.8.0+dfsg1-5)
Patches:
Vendor:http://git.chromium.org/gitweb/?p=chromium/src.git;a=patch;h=f183580d61c054f7f6bb35cfe29e1b342390fbebcd
Upstream:http://git.gnome.org/browse/libxml2/commit/?id=459eeb9dc752d5185f57ff6b135027f11981a626
Upstream:http://git.gnome.org/browse/libxml2/commit/?id=4f9fdc709c4861c390cd84e2ed1fd878b3442e28
Upstream:http://git.gnome.org/browse/libxml2/commit/?id=baaf03f80f817bb34c421421e6cb4d68c353ac9a
More Information

Valid XHTML 1.0 Strict

Updated: 2013-05-01 19:14:48 UTC (commit 6792)