[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:192 -- Mandriva libxml2

ID: oval:org.secpod.oval:def:301643Date: (C)2012-01-07   (M)2024-02-08
Class: PATCHFamily: unix




A heap-based buffer overflow was found in how libxml2 handled long XML entity names. If an application linked against libxml2 processed untrusted malformed XML content, it could cause the application to crash or possibly execute arbitrary code . The updated packages have been patched to prevent this issue. As well, the patch to fix CVE-2008-3281 has been updated to remove the hard-coded entity limit that was set to 5M, instead using XML entity density heuristics. Many thanks to Daniel Veillard of Red Hat for his hard work in tracking down and dealing with the edge cases discovered with the initial fix to this issue.

Platform:
Mandriva Linux 2007.1
Mandriva Linux 2008.1
Mandriva Linux 2008.0
Product:
libxml2
Reference:
MDVSA-2008:192
CVE-2008-3281
CVE-2008-3529
CVE    2
CVE-2008-3529
CVE-2008-3281
CPE    3
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies