Jump to content
Compatible Support Forums
Sign in to follow this  
news

[RHSA-2008:0886-01] Important: libxml2 security update

Recommended Posts

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

 

=====================================================================

Red Hat Security Advisory

 

Synopsis: Important: libxml2 security update

Advisory ID: RHSA-2008:0886-01

Product: Red Hat Enterprise Linux

Advisory URL: https://rhn.redhat.com/errata/RHSA-2008-0886.html

Issue date: 2008-09-11

CVE Names: CVE-2003-1564 CVE-2008-3529

=====================================================================

 

1. Summary:

 

Updated libxml2 packages that fix various security issues are now available

for Red Hat Enterprise Linux 2.1.

 

This update has been rated as having important security impact by the Red

Hat Security Response Team.

 

2. Relevant releases/architectures:

 

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386

 

3. Description:

 

The libxml2 packages provide a library that allows you to manipulate XML

files. It includes support to read, modify, and write XML and HTML files.

 

A heap-based buffer overflow flaw was found in the way libxml2 handled long

XML entity names. If an application linked against libxml2 processed

untrusted malformed XML content, it could cause the application to crash

or, possibly, execute arbitrary code. (CVE-2008-3529)

 

A denial of service flaw was found in the way libxml2 processed certain

content. If an application linked against libxml2 processed malformed XML

content, it could cause the application to use an excessive amount of CPU

time and memory, and stop responding. (CVE-2003-1564)

 

All users of libxml2 are advised to upgrade to these updated packages,

which contain backported patches to resolve these issues.

 

4. Solution:

 

Before applying this update, make sure that all previously-released

errata relevant to your system have been applied.

 

This update is available via Red Hat Network. Details on how to use

the Red Hat Network to apply this update are available at

http://kbase.redhat.com/faq/FAQ_58_10188

 

5. Bugs fixed (http://bugzilla.redhat.com/):

 

461015 - CVE-2008-3529 libxml2: long entity name heap buffer overflow

461107 - CVE-2003-1564 libxml2: billion laughs DoS attack

 

6. Package List:

 

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 :

 

Source:

ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/libxml2-2.4.19-11.ent.src.rpm

 

i386:

libxml2-2.4.19-11.ent.i386.rpm

libxml2-devel-2.4.19-11.ent.i386.rpm

libxml2-python-2.4.19-11.ent.i386.rpm

 

ia64:

libxml2-2.4.19-11.ent.ia64.rpm

libxml2-devel-2.4.19-11.ent.ia64.rpm

libxml2-python-2.4.19-11.ent.ia64.rpm

 

Red Hat Linux Advanced Workstation 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/libxml2-2.4.19-11.ent.src.rpm

 

ia64:

libxml2-2.4.19-11.ent.ia64.rpm

libxml2-devel-2.4.19-11.ent.ia64.rpm

libxml2-python-2.4.19-11.ent.ia64.rpm

 

Red Hat Enterprise Linux ES version 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/libxml2-2.4.19-11.ent.src.rpm

 

i386:

libxml2-2.4.19-11.ent.i386.rpm

libxml2-devel-2.4.19-11.ent.i386.rpm

libxml2-python-2.4.19-11.ent.i386.rpm

 

Red Hat Enterprise Linux WS version 2.1:

 

Source:

ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/libxml2-2.4.19-11.ent.src.rpm

 

i386:

libxml2-2.4.19-11.ent.i386.rpm

libxml2-devel-2.4.19-11.ent.i386.rpm

libxml2-python-2.4.19-11.ent.i386.rpm

 

These packages are GPG signed by Red Hat for security. Our key and

details on how to verify the signature are available from

https://www.redhat.com/security/team/key/#package

 

7. References:

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1564

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529

http://www.redhat.com/security/updates/classification/#important

 

8. Contact:

 

The Red Hat security contact is . More contact

details at https://www.redhat.com/security/team/contact/

 

Copyright 2008 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----

Version: GnuPG v1.4.4 (GNU/Linux)

 

iD8DBQFIySOiXlSAg2UNWIIRAkKJAJ9ahc0RK34FbK6E/7DWbgYoaq4w/ACaA1G0

9N7kIKj5u0axbxhq7YblFsM=

=pWgV

-----END PGP SIGNATURE-----

 

 

--

 

Share this post


Link to post

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this  

×