~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
Candidate: CVE-2013-2902
PublicDate: 2013-08-21
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2902
 https://src.chromium.org/viewvc/blink?revision=155043&view=revision
 http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html
 http://crbug.com/260105
Description:
 Use-after-free vulnerability in the XSLT ProcessingInstruction
 implementation in Blink, as used in Google Chrome before 29.0.1547.57,
 allows remote attackers to cause a denial of service or possibly have
 unspecified other impact via vectors related to an applyXSLTransform call
 involving (1) an HTML document or (2) an xsl:processing-instruction element
 that is still in the process of loading.
Ubuntu-Description:
Notes:
 sarnold> As of 2013-08-21, I don't know if libxslt needs an update or if
  this is strictly in chromium-browser.
 mdeslaur> fix was in chromium, marking libxslt as not-affected
Bugs:
Priority: medium
Discovered-by:
Assigned-to: chad

Patches_chromium-browser:
upstream_chromium-browser: released (29.0.1547.57)
lucid_chromium-browser: ignored (reached end-of-life)
precise_chromium-browser: released (30.0.1599.114-0ubuntu0.12.04.3)
quantal_chromium-browser: released (30.0.1599.114-0ubuntu0.12.10.2)
raring_chromium-browser: released (30.0.1599.114-0ubuntu0.13.04.2)
saucy_chromium-browser: not-affected (29.0.1547.65-0ubuntu2)
devel_chromium-browser: not-affected (29.0.1547.65-0ubuntu2)

Patches_libxslt:
upstream_libxslt: needs-triage
lucid_libxslt: not-affected
precise_libxslt: not-affected
quantal_libxslt: not-affected
raring_libxslt: not-affected
saucy_libxslt: not-affected
devel_libxslt: not-affected