Synopsis: Moderate: libxml2 security update
Advisory ID: SLSA-2014:0513-1
Issue Date: 2014-05-19
CVE Numbers: CVE-2013-2877
CVE-2014-0191
—
It was discovered that libxml2 loaded external parameter entities even
when entity substitution was disabled. A remote attacker able to provide a
specially crafted XML file to an application linked against libxml2 could
use this flaw to conduct XML External Entity (XXE) attacks, possibly
resulting in a denial of service or an information leak on the system.
(CVE-2014-0191)
An out-of-bounds read flaw was found in the way libxml2 detected the end
of an XML file. A remote attacker could provide a specially crafted XML
file that, when processed by an application linked against libxml2, could
cause the application to crash. (CVE-2013-2877)
The desktop must be restarted (log out, then log back in) for this update
to take effect.
—
SL6
x86_64
libxml2-2.7.6-14.el6_5.1.i686.rpm
libxml2-2.7.6-14.el6_5.1.x86_64.rpm
libxml2-debuginfo-2.7.6-14.el6_5.1.i686.rpm
libxml2-debuginfo-2.7.6-14.el6_5.1.x86_64.rpm
libxml2-python-2.7.6-14.el6_5.1.x86_64.rpm
libxml2-devel-2.7.6-14.el6_5.1.i686.rpm
libxml2-devel-2.7.6-14.el6_5.1.x86_64.rpm
libxml2-static-2.7.6-14.el6_5.1.x86_64.rpm
i386
libxml2-2.7.6-14.el6_5.1.i686.rpm
libxml2-debuginfo-2.7.6-14.el6_5.1.i686.rpm
libxml2-python-2.7.6-14.el6_5.1.i686.rpm
libxml2-devel-2.7.6-14.el6_5.1.i686.rpm
libxml2-static-2.7.6-14.el6_5.1.i686.rpm
– Scientific Linux Development Team