Описание
ELSA-2012-1288: libxml2 security update (MODERATE)
[2.7.6-8.0.1.el6_3.3 ]
- Update doc/redhat.gif in tarball
- Add libxml2-oracle-enterprise.patch and update logos in tarball
[2.7.6-8.el6_3.3]
- Change the XPath code to percolate allocation error (CVE-2011-1944)
[2.7.6-8.el6_3.2]
- Fix an off by one pointer access (CVE-2011-3102)
[2.7.6-8.el6_3.1]
- Fix a failure to report xmlreader parsing failures
- Fix parser local buffers size problems (rhbz#843741)
- Fix entities local buffers size problems (rhbz#843741)
- Fix an error in previous commit (rhbz#843741)
- Do not fetch external parsed entities
- Impose a reasonable limit on attribute size (rhbz#843741)
- Impose a reasonable limit on comment size (rhbz#843741)
- Impose a reasonable limit on PI size (rhbz#843741)
- Cleanups and new limit APIs for dictionaries (rhbz#843741)
- Introduce some default parser limits (rhbz#843741)
- Implement some default limits in the XPath module
- Fixup limits parser (rhbz#843741)
- Enforce XML_PARSER_EOF state handling through the parser
- Avoid quadratic behaviour in some push parsing cases (rhbz#843741)
- More avoid quadratic behaviour (rhbz#843741)
- Strengthen behaviour of the push parser in problematic situations (rhbz#843741)
- More fixups on the push parser behaviour (rhbz#843741)
- Fix a segfault on XSD validation on pattern error
- Fix an unimplemented part in RNG value validation
[2.7.6-8.el6]
- remove chunk in patch related to configure.in as it breaks rebuild
- Resolves: rhbz#788846
[2.7.6-7.el6]
- fix previous build to force compilation of randomization code
- Resolves: rhbz#788846
[2.7.6-6.el6]
- adds randomization to hash and dict structures CVE-2012-0841
- Resolves: rhbz#788846
[2.7.6-5.el6]
- Make sure the parser returns when getting a Stop order CVE-2011-3905
- Fix an allocation error when copying entities CVE-2011-3919
- Resolves: rhbz#771910
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
libxml2
2.6.26-2.1.15.0.1.el5_8.5
libxml2-devel
2.6.26-2.1.15.0.1.el5_8.5
libxml2-python
2.6.26-2.1.15.0.1.el5_8.5
Oracle Linux x86_64
libxml2
2.6.26-2.1.15.0.1.el5_8.5
libxml2-devel
2.6.26-2.1.15.0.1.el5_8.5
libxml2-python
2.6.26-2.1.15.0.1.el5_8.5
Oracle Linux i386
libxml2
2.6.26-2.1.15.0.1.el5_8.5
libxml2-devel
2.6.26-2.1.15.0.1.el5_8.5
libxml2-python
2.6.26-2.1.15.0.1.el5_8.5
Oracle Linux 6
Oracle Linux x86_64
libxml2
2.7.6-8.0.1.el6_3.3
libxml2-devel
2.7.6-8.0.1.el6_3.3
libxml2-python
2.7.6-8.0.1.el6_3.3
libxml2-static
2.7.6-8.0.1.el6_3.3
Oracle Linux i686
libxml2
2.7.6-8.0.1.el6_3.3
libxml2-devel
2.7.6-8.0.1.el6_3.3
libxml2-python
2.7.6-8.0.1.el6_3.3
libxml2-static
2.7.6-8.0.1.el6_3.3
Связанные CVE
Связанные уязвимости
Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Multiple integer overflows in libxml2, as used in Google Chrome before ...
Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.