SCIENTIFIC-LINUX-ERRATA Archives

March 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 30 Mar 2015 15:27:36 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (31 lines)
Synopsis:          Moderate: libxml2 security update
Advisory ID:       SLSA-2015:0749-1
Issue Date:        2015-03-30
CVE Numbers:       CVE-2014-0191
--

It was discovered that libxml2 loaded external parameter entities even
when entity substitution was disabled. A remote attacker able to provide a
specially crafted XML file to an application linked against libxml2 could
use this flaw to conduct XML External Entity (XXE) attacks, possibly
resulting in a denial of service or an information leak on the system.
(CVE-2014-0191)

The desktop must be restarted (log out, then log back in) for this update
to take effect.
--

SL7
  x86_64
    libxml2-2.9.1-5.el7_1.2.i686.rpm
    libxml2-2.9.1-5.el7_1.2.x86_64.rpm
    libxml2-debuginfo-2.9.1-5.el7_1.2.i686.rpm
    libxml2-debuginfo-2.9.1-5.el7_1.2.x86_64.rpm
    libxml2-python-2.9.1-5.el7_1.2.x86_64.rpm
    libxml2-devel-2.9.1-5.el7_1.2.i686.rpm
    libxml2-devel-2.9.1-5.el7_1.2.x86_64.rpm
    libxml2-static-2.9.1-5.el7_1.2.i686.rpm
    libxml2-static-2.9.1-5.el7_1.2.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2