|
|
Subscribe / Log in / New account

libxml2: arbitrary code execution

Package(s):libxml2 CVE #(s):CVE-2010-4494
Created:December 27, 2010 Updated:April 15, 2011
Description: From the Debian advisory:

Yang Dingning discovered a double free in libxml's Xpath processing, which might allow the execution of arbitrary code.

Alerts:
Scientific Linux SL-ming-20130201 mingw32-libxml2 2013-02-01
Oracle ELSA-2013-0217 mingw32-libxml2 2013-02-01
CentOS CESA-2013:0217 mingw32-libxml2 2013-02-01
Red Hat RHSA-2013:0217-01 mingw32-libxml2 2013-01-31
Scientific Linux SL-libx-20111206 libxml2 2011-12-06
Red Hat RHSA-2011:1749-03 libxml2 2011-12-06
Gentoo 201110-26 libxml2 2011-10-26
Fedora FEDORA-2011-2699 libxml2 2011-03-05
SUSE SUSE-SR:2011:005 hplip, perl, subversion, t1lib, bind, tomcat5, tomcat6, avahi, gimp, aaa_base, build, libtiff, krb5, nbd, clamav, aaa_base, flash-player, pango, openssl, subversion, postgresql, logwatch, libxml2, quagga, fuse, util-linux 2011-04-01
openSUSE openSUSE-SU-2011:0255-1 libxml2 2011-03-31
Fedora FEDORA-2011-2697 libxml2 2011-03-05
Mandriva MDVSA-2010:260 libxml2 2010-12-29
Debian DSA-2137-1 libxml2 2010-12-26

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds