|| ||email@example.com |
|| ||firstname.lastname@example.org |
|| ||Security ERRATA Important: libxml2 on SL6.x i386/x86_64 |
|| ||Wed, 11 Jan 2012 15:50:40 -0600|
|| ||Article, Thread
Synopsis: Important: libxml2 security update
Issue Date: 2012-01-11
CVE Numbers: CVE-2011-3905
The libxml2 library is a development toolbox providing the implementation
of various XML standards.
A heap-based buffer overflow flaw was found in the way libxml2 decoded
entity references with long names. A remote attacker could provide a
specially-crafted XML file that, when opened in an application linked
against libxml2, would cause the application to crash or, potentially,
execute arbitrary code with the privileges of the user running the
An out-of-bounds memory read flaw was found in libxml2. A remote attacker
could provide a specially-crafted XML file that, when opened in an
application linked against libxml2, would cause the application to crash.
All users of libxml2 are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. The desktop must
be restarted (log out, then log back in) for this update to take effect.
- Scientific Linux Development Team
to post comments)