A heap-based buffer overflow was found in the way libxml2 decoded an entity reference with a long name. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application. Reference: http://googlechromereleases.blogspot.com/2012/01/stable-channel-update.html Patch: http://git.gnome.org/browse/libxml2/commit/?id=5bd3c061823a8499b27422aee04ea20aae24f03e
Created libxml2 tracking bugs for this issue Affects: fedora-all [bug 772122]
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2012:0017 https://rhn.redhat.com/errata/RHSA-2012-0017.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2012:0016 https://rhn.redhat.com/errata/RHSA-2012-0016.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0018 https://rhn.redhat.com/errata/RHSA-2012-0018.html
Created mingw32-libxml2 tracking bugs for this issue Affects: fedora-all [bug 755814]
Statement: This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively.
This issue has been addressed in following products: Red Hat Enterprise Linux 5.6 EUS - Server Only Via RHSA-2012:0104 https://rhn.redhat.com/errata/RHSA-2012-0104.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0217 https://rhn.redhat.com/errata/RHSA-2013-0217.html