Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
lists.opensuse.org/opensuse-updates/2013-04/msg00109.html
lists.opensuse.org/opensuse-updates/2013-06/msg00081.html
secunia.com/advisories/53061
www.openwall.com/lists/oss-security/2013/04/17/4
www.openwall.com/lists/oss-security/2013/04/19/1
www.ubuntu.com/usn/USN-1817-1
bugzilla.gnome.org/show_bug.cgi?id=690202
git.gnome.org/browse/libxml2/commit/?id=de0cc20c29cb3f056062925395e0f68d2250a46f