CVE-2014-0191

Priority
Medium
Description
It was discovered that libxml2, a library providing support to read,
modify and write XML files, incorrectly performs entity substituton in
the doctype prolog, even if the application using libxml2 disabled any
entity substitution. A remote attacker could provide a
specially-crafted XML file that, when processed, would lead to the
exhaustion of CPU and memory resources or file descriptors.
References
Bugs
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 10.04 LTS (Lucid Lynx):released (2.7.6.dfsg-1ubuntu1.11)
Ubuntu 12.04 LTS (Precise Pangolin):released (2.7.8.dfsg-5.1ubuntu4.7)
Ubuntu 12.10 (Quantal Quetzal):released (2.8.0+dfsg1-5ubuntu2.5)
Ubuntu 13.10 (Saucy Salamander):released (2.9.1+dfsg1-3ubuntu2.1)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.9.1+dfsg1-3ubuntu4.1)
Ubuntu 14.10 (Utopic Unicorn):released (2.9.1+dfsg1-3ubuntu5)
Patches:
Upstream:https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df
More Information

Valid XHTML 1.0 Strict

Updated: 2014-05-15 18:14:36 UTC (commit 8061)