LWN.net Logo

libxml2: code execution

Package(s):libxml2 CVE #(s):CVE-2012-5134
Created:November 30, 2012 Updated:March 1, 2013
Description:

From the Red hat advisory:

A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2012-5134)

Alerts:
Red Hat RHSA-2012:1512-01 2012-11-29
CentOS CESA-2012:1512 2012-11-29
CentOS CESA-2012:1512 2012-11-29
Oracle ELSA-2012-1512 2012-11-29
Oracle ELSA-2012-1512 2012-11-29
Scientific Linux SL-libx-20121129 2012-11-29
Mageia MGASA-2012-0350 2012-11-30
Mandriva MDVSA-2012:176 2012-12-02
Debian DSA-2580-1 2012-12-02
Ubuntu USN-1656-1 2012-12-05
Slackware SSA:2012-341-03 2012-12-06
SUSE SUSE-SU-2012:1636-1 2012-12-12
openSUSE openSUSE-SU-2012:1647-1 2012-12-17
openSUSE openSUSE-SU-2013:0178-1 2013-01-23
Red Hat RHSA-2013:0217-01 2013-01-31
CentOS CESA-2013:0217 2013-02-01
Oracle ELSA-2013-0217 2013-02-01
Scientific Linux SL-ming-20130201 2013-02-01
Oracle ELSA-2013-0581 2013-03-01
Mandriva MDVSA-2013:056 2013-04-08

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds