Users of libxml2 please be advised of a Denial of service vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
MDVSA-2010:243: [MDVSA-2010:243] libxml2 Denial-of-service
Problem Description:Read more at www.criticalwatch.com
A vulnerability was discovered and corrected in libxml2:
libxml2 before 2.7.8 reads from invalid memory locations
during processing of malformed XPath expressions, which allows
context-dependent attackers to cause a denial of service (application
crash) via a crafted XML document (CVE-2010-4008).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct these issues.
See this Amp at http://bit.ly/fyPHIZ
No comments:
Post a Comment