User: Password:
|
|
Subscribe / Log in / New account

Scientific Linux alert SLSA-2014:0513-1 (libxml2)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Moderate: libxml2 on SL6.x i386/x86_64
Date:  Mon, 19 May 2014 14:03:59 +0000
Message-ID:  <20140519140359.15203.60661@slpackages.fnal.gov>

Synopsis: Moderate: libxml2 security update Advisory ID: SLSA-2014:0513-1 Issue Date: 2014-05-19 CVE Numbers: CVE-2013-2877 CVE-2014-0191 -- It was discovered that libxml2 loaded external parameter entities even when entity substitution was disabled. A remote attacker able to provide a specially crafted XML file to an application linked against libxml2 could use this flaw to conduct XML External Entity (XXE) attacks, possibly resulting in a denial of service or an information leak on the system. (CVE-2014-0191) An out-of-bounds read flaw was found in the way libxml2 detected the end of an XML file. A remote attacker could provide a specially crafted XML file that, when processed by an application linked against libxml2, could cause the application to crash. (CVE-2013-2877) The desktop must be restarted (log out, then log back in) for this update to take effect. -- SL6 x86_64 libxml2-2.7.6-14.el6_5.1.i686.rpm libxml2-2.7.6-14.el6_5.1.x86_64.rpm libxml2-debuginfo-2.7.6-14.el6_5.1.i686.rpm libxml2-debuginfo-2.7.6-14.el6_5.1.x86_64.rpm libxml2-python-2.7.6-14.el6_5.1.x86_64.rpm libxml2-devel-2.7.6-14.el6_5.1.i686.rpm libxml2-devel-2.7.6-14.el6_5.1.x86_64.rpm libxml2-static-2.7.6-14.el6_5.1.x86_64.rpm i386 libxml2-2.7.6-14.el6_5.1.i686.rpm libxml2-debuginfo-2.7.6-14.el6_5.1.i686.rpm libxml2-python-2.7.6-14.el6_5.1.i686.rpm libxml2-devel-2.7.6-14.el6_5.1.i686.rpm libxml2-static-2.7.6-14.el6_5.1.i686.rpm - Scientific Linux Development Team


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds