Common Vulnerabilities and Exposures assigned an identifier CVE-2013-2877 to the following vulnerability: parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state. References: [1] ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz [2] http://git.chromium.org/gitweb/?p=chromium/chromium.git;a=commit;h=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1 [3] http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html [4] https://code.google.com/p/chromium/issues/detail?id=229019 Relevant upstream patch: [5] https://git.gnome.org/browse/libxml2/commit/parser.c?id=e50ba8164eee06461c73cd8abb9b46aa0be81869
This issue affects the versions of the libxml2 package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the version of the libxml2 package, as shipped with Fedora release of 17. Please schedule an update. -- This issue did NOT affect the versions of the libxml2 package, as shipped with Fedora release of 18 and 19 (the libxml2 package versions got already update wrt to this flaw).
Created libxml2 tracking bugs for this issue: Affects: fedora-17 [bug 983206]
Statement: (none)
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0513 https://rhn.redhat.com/errata/RHSA-2014-0513.html