1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
Candidate: CVE-2013-2902
PublicDate: 2013-08-21
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2902
https://src.chromium.org/viewvc/blink?revision=155043&view=revision
http://googlechromereleases.blogspot.com/2013/08/stable-channel-update.html
http://crbug.com/260105
Description:
Use-after-free vulnerability in the XSLT ProcessingInstruction
implementation in Blink, as used in Google Chrome before 29.0.1547.57,
allows remote attackers to cause a denial of service or possibly have
unspecified other impact via vectors related to an applyXSLTransform call
involving (1) an HTML document or (2) an xsl:processing-instruction element
that is still in the process of loading.
Ubuntu-Description:
Notes:
sarnold> As of 2013-08-21, I don't know if libxslt needs an update or if
this is strictly in chromium-browser.
mdeslaur> fix was in chromium, marking libxslt as not-affected
Bugs:
Priority: medium
Discovered-by:
Assigned-to: chad
Patches_chromium-browser:
upstream_chromium-browser: released (29.0.1547.57)
lucid_chromium-browser: ignored (reached end-of-life)
precise_chromium-browser: released (30.0.1599.114-0ubuntu0.12.04.3)
quantal_chromium-browser: released (30.0.1599.114-0ubuntu0.12.10.2)
raring_chromium-browser: released (30.0.1599.114-0ubuntu0.13.04.2)
saucy_chromium-browser: not-affected (29.0.1547.65-0ubuntu2)
devel_chromium-browser: not-affected (29.0.1547.65-0ubuntu2)
Patches_libxslt:
upstream_libxslt: needs-triage
lucid_libxslt: not-affected
precise_libxslt: not-affected
quantal_libxslt: not-affected
raring_libxslt: not-affected
saucy_libxslt: not-affected
devel_libxslt: not-affected
|