LWN.net Logo

Mageia alert MGASA-2012-0350 (libxml2)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0350: libxml2-2.7.8-9.8.mga1 (1/core), libxml2-2.7.8-14.20120229.4.mga2 (2/core)
Date:  Fri, 30 Nov 2012 23:31:37 +0100
Message-ID:  <20121130223137.GA6683@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2012-0350 Date: November 30th, 2012 Affected releases: 1, 2 Description: Updated libxml2 packages fix security vulnerability: Heap-based buffer underflow, in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document (CVE-2012-5134). Updated Packages: Mageia 1: lib(64)xml2_2-2.7.8-9.8.mga1 lib(64)xml2-devel-2.7.8-9.8.mga1 libxml2-utils-2.7.8-9.8.mga1 libxml2-python-2.7.8-9.8.mga1 Mageia 2: libxml2-utils-2.7.8-14.20120229.4.mga2 libxml2-python-2.7.8-14.20120229.4.mga2 lib(64)xml2_2-2.7.8-14.20120229.4.mga2 lib(64)xml2-devel-2.7.8-14.20120229.4.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134 https://rhn.redhat.com/errata/RHSA-2012-1512.html https://bugs.mageia.org/show_bug.cgi?id=8248 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds