SCIENTIFIC-LINUX-ERRATA Archives

February 2013

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Pat Riehecky <[log in to unmask]>
Date:
Fri, 1 Feb 2013 09:47:29 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (90 lines)
Synopsis:          Important: mingw32-libxml2 security update
Issue Date:        2013-01-31
CVE Numbers:       CVE-2010-4008
                    CVE-2010-4494
                    CVE-2011-1944
                    CVE-2011-0216
                    CVE-2011-2821
                    CVE-2011-2834
                    CVE-2011-3905
                    CVE-2011-3919
                    CVE-2012-0841
                    CVE-2011-3102
                    CVE-2012-5134
--

IMPORTANT NOTE: The mingw32 packages in Scientific Linux 6 will no longer be
updated proactively and will be deprecated with the release of 
Scientific Linux
6.4. These packages were provided to support other capabilities in 
Scientific
Linux and were not intended for direct use. You are advised to not use these
packages with immediate effect.

A heap-based buffer overflow flaw was found in the way libxml2 decoded 
entity
references with long names. A remote attacker could provide a 
specially-crafted
XML file that, when opened in an application linked against libxml2, would
cause the application to crash or, potentially, execute arbitrary code 
with the
privileges of the user running the application. (CVE-2011-3919)

A heap-based buffer underflow flaw was found in the way libxml2 decoded 
certain
entities. A remote attacker could provide a specially-crafted XML file that,
when opened in an application linked against libxml2, would cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2012-5134)

It was found that the hashing routine used by libxml2 arrays was 
susceptible to
predictable hash collisions. Sending a specially-crafted message to an XML
service could result in longer processing time, which could lead to a 
denial of
service. To mitigate this issue, randomization has been added to the hashing
function to reduce the chance of an attacker successfully causing 
intentional
collisions. (CVE-2012-0841)

Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path
Language) expressions. If an attacker were able to supply a 
specially-crafted
XML file to an application using libxml2, as well as an XPath expression for
that application to run against the crafted file, it could cause the
application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821,
CVE-2011-2834)

Two heap-based buffer overflow flaws were found in the way libxml2 decoded
certain XML files. A remote attacker could provide a specially-crafted 
XML file
that, when opened in an application linked against libxml2, would cause the
application to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2011-0216, 
CVE-2011-3102)

An integer overflow flaw, leading to a heap-based buffer overflow, was 
found in
the way libxml2 parsed certain XPath expressions. If an attacker were 
able to
supply a specially-crafted XML file to an application using libxml2, as 
well as
an XPath expression for that application to run against the crafted file, it
could cause the application to crash or, possibly, execute arbitrary code.
(CVE-2011-1944)

An out-of-bounds memory read flaw was found in libxml2. A remote 
attacker could
provide a specially-crafted XML file that, when opened in an application 
linked
against libxml2, would cause the application to crash. (CVE-2011-3905)
--

SL6
   x86_64
     mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm
     mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm
     mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2