lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140711142953.GB4015@pisco.westfalen.local>
Date: Fri, 11 Jul 2014 16:29:53 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2978-1] libxml2 security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2978-1                   security@...ian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
July 11, 2014                          http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libxml2
CVE ID         : CVE-2014-0191

Daniel P. Berrange discovered a denial of service vulnerability in 
libxml2 entity substitution.

For the stable distribution (wheezy), this problem has been fixed in
version 2.8.0+dfsg1-7+wheezy1.

For the unstable distribution (sid), this problem has been fixed in
version 2.9.1+dfsg1-4.

We recommend that you upgrade your libxml2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=NG04
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ