From Mageia wiki
Jump to: navigation, search

MGASA-2013-0085

Date: March 3rd, 2013
Affected releases: 2
Media: Core


Description:
Updated libxml2 packages fix security vulnerability:

A denial of service flaw was found in the way libxml2 performed string
substitutions when entity values for entity references replacement was
enabled. A remote attacker could provide a specially-crafted XML file
that, when processed by an application linked against libxml2, would
lead to excessive CPU consumption (CVE-2013-0338).


Updated Packages:
i586:
libxml2_2-2.7.8-14.20120229.5.mga2.i586.rpm
libxml2-devel-2.7.8-14.20120229.5.mga2.i586.rpm
libxml2-python-2.7.8-14.20120229.5.mga2.i586.rpm
libxml2-utils-2.7.8-14.20120229.5.mga2.i586.rpm
libxml2-debug-2.7.8-14.20120229.5.mga2.i586.rpm

x86_64:
lib64xml2_2-2.7.8-14.20120229.5.mga2.x86_64.rpm
lib64xml2-devel-2.7.8-14.20120229.5.mga2.x86_64.rpm
libxml2-python-2.7.8-14.20120229.5.mga2.x86_64.rpm
libxml2-utils-2.7.8-14.20120229.5.mga2.x86_64.rpm
libxml2-debug-2.7.8-14.20120229.5.mga2.x86_64.rpm

SRPMS:
libxml2-2.7.8-14.20120229.5.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338
https://rhn.redhat.com/errata/RHSA-2013-0581.html
https://bugs.mageia.org/show_bug.cgi?id=9228