This bug was fixed in the package libxml2 - 2.7.6.dfsg-1ubuntu1.9

---------------
libxml2 (2.7.6.dfsg-1ubuntu1.9) lucid-security; urgency=low

  * SECURITY UPDATE: external entity expansion attack (LP: #1194410)
    - do not fetch external parsed entities in parser.c, added test to
      test/errors/extparsedent.xml, result/errors/extparsedent.xml.
    - 
https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
    - CVE-2013-0339
  * SECURITY UPDATE: denial of service via incomplete document
    - try to stop parsing as quickly as possible in parser.c,
      include/libxml/xmlerror.h.
    - 
https://git.gnome.org/browse/libxml2/commit/?id=48b4cdde3483e054af8ea02e0cd7ee467b0e9a50
    - 
https://git.gnome.org/browse/libxml2/commit/?id=e50ba8164eee06461c73cd8abb9b46aa0be81869
    - CVE-2013-2877
 -- Marc Deslauriers <[email protected]>   Thu, 11 Jul 2013 15:07:11 
-0400

** Changed in: libxml2 (Ubuntu Quantal)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1194410

Title:
  Apply upstream patch to close XXE vulnerability in precise

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libxml2/+bug/1194410/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to