Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
https://bugzilla.gnome.org/show_bug.cgi?id=690202
http://www.ubuntu.com/usn/USN-1817-1
http://www.openwall.com/lists/oss-security/2013/04/19/1
http://www.openwall.com/lists/oss-security/2013/04/17/4
http://secunia.com/advisories/53061
http://lists.opensuse.org/opensuse-updates/2013-06/msg00081.html
http://lists.opensuse.org/opensuse-updates/2013-04/msg00109.html