CVE-2010-4008
Published: 8 November 2010
libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
Priority
Status
Package | Release | Status |
---|---|---|
libxml2 Launchpad, Ubuntu, Debian |
dapper |
Released
(2.6.24.dfsg-1ubuntu1.6)
|
hardy |
Released
(2.6.31.dfsg-2ubuntu1.5)
|
|
karmic |
Released
(2.7.5.dfsg-1ubuntu1.2)
|
|
lucid |
Released
(2.7.6.dfsg-1ubuntu1.1)
|
|
maverick |
Released
(2.7.7.dfsg-4ubuntu0.1)
|
|
upstream |
Released
(2.7.8.dfsg-1)
|
|
Patches: upstream: http://git.gnome.org/browse/libxml2/commit/?id=91d19754d46acd4a639a8b9e31f50f31c78f8c9c upstream: http://git.gnome.org/browse/libxml2/commit/?id=ea90b894146030c214a7df6d8375310174f134b9 |