Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2008-0884

Опубликовано: 11 сент. 2008
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2008-0884: libxml2 security update (IMPORTANT)

[2.6.26-2.1.2.6.0.1]

  • Add libxml2-enterprise.patch and update logos in tarball

[2.6.26-2.1.2.6]

  • Patch to fix an entity name copy buffer overflow CVE-2008-3529
  • Resolves: rhbz#461023

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

libxml2

2.6.26-2.1.2.6.0.1

libxml2-devel

2.6.26-2.1.2.6.0.1

libxml2-python

2.6.26-2.1.2.6.0.1

Oracle Linux i386

libxml2

2.6.26-2.1.2.6.0.1

libxml2-devel

2.6.26-2.1.2.6.0.1

libxml2-python

2.6.26-2.1.2.6.0.1

Связанные CVE

Связанные уязвимости

ubuntu
почти 17 лет назад

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.

redhat
почти 17 лет назад

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.

nvd
почти 17 лет назад

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.

debian
почти 17 лет назад

Heap-based buffer overflow in the xmlParseAttValueComplex function in ...

github
около 3 лет назад

Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.