[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140711142953.GB4015@pisco.westfalen.local>
Date: Fri, 11 Jul 2014 16:29:53 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 2978-1] libxml2 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2978-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 11, 2014 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libxml2
CVE ID : CVE-2014-0191
Daniel P. Berrange discovered a denial of service vulnerability in
libxml2 entity substitution.
For the stable distribution (wheezy), this problem has been fixed in
version 2.8.0+dfsg1-7+wheezy1.
For the unstable distribution (sid), this problem has been fixed in
version 2.9.1+dfsg1-4.
We recommend that you upgrade your libxml2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBAgAGBQJTv/RxAAoJEBDCk7bDfE42m5gQAIWCC4DL7C92D8RiFb9Sjozr
CuKi70+05tUrG1mv5mW0RwqBPKP39z8CYLc8XMesdhv5boBLmjZ5ysQrIZcJMFL8
UAGbUCvc3My18LgGsPqWSp2RS5rG5E/i71R/+5FD0k0opu0owrb2j1PIl+qaC9WD
pYzE/9dz9chF+RnzS/hINGuiNghVovXki7a/Voc99ddEtulgcjPvzLXpWr/Fhb0a
94TLiqdnIp25Db9oIv6nG8oE1Ay+9FmqiRHSpvF+MVLc2Paz7rDaetBbJjlyEXMO
aZgrHhL/p06ftLK+HuYjWzybHQjq7IeTh8M3i/RqnvVwEeOligBVMsCLsVARUd2l
VLJaZoUTCPUqP7J5+/GcmKTPROhH1oIdDo/SjPIiYFqFytC5/bGJkXm5Wpx7dZUX
hRZ8hHPu5S3L3R6OKeTa94ybe9dF4Sr0S2w6mneDZSJ7caGez4G5FqW5uX56Xicy
zdk7rR/KiDqDUd7MDPgdUaqIbakGnO2GVJtw+ec1v/vyGk8QYv0BeI4gAAUT2ahU
S1iaYdUTl/UKEvTkQoaJQZit/RBYnloxtkK0qlGAZY5o9PEFSrD51db8ndDhDYil
KsS7fZu6pff5QaJ3MAbei/gVvYmyny28HY8Q10BYGQxvIKxRowyiTo5vL2+P1rXc
qAusOIoGkTE1em4tga6Q
=NG04
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists