Описание
ELSA-2014-1655: libxml2 security update (MODERATE)
[2.9.1-5.0.1.el7_0.1]
- Update doc/redhat.gif in tarball
- Add libxml2-oracle-enterprise.patch and update logos in tarball
[2.9.1-5.1]
- CVE-2014-3660 denial of service via recursive entity expansion (rhbz#1149087)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libxml2
2.7.6-17.0.1.el6_6.1
libxml2-devel
2.7.6-17.0.1.el6_6.1
libxml2-python
2.7.6-17.0.1.el6_6.1
libxml2-static
2.7.6-17.0.1.el6_6.1
Oracle Linux i686
libxml2
2.7.6-17.0.1.el6_6.1
libxml2-devel
2.7.6-17.0.1.el6_6.1
libxml2-python
2.7.6-17.0.1.el6_6.1
libxml2-static
2.7.6-17.0.1.el6_6.1
Oracle Linux 7
Oracle Linux x86_64
libxml2
2.9.1-5.0.1.el7_0.1
libxml2-devel
2.9.1-5.0.1.el7_0.1
libxml2-python
2.9.1-5.0.1.el7_0.1
libxml2-static
2.9.1-5.0.1.el7_0.1
Связанные CVE
Связанные уязвимости
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
parser.c in libxml2 before 2.9.2 does not properly prevent entity expa ...
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.