Debian Security Advisory

DSA-2255-1 libxml2 -- buffer overflow

Date Reported:
06 Jun 2011
Affected Packages:
libxml2
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 628537.
More information:

Chris Evans discovered that libxml was vulnerable to buffer overflows, which allowed a crafted XML input file to potentially execute arbitrary code.

For the oldstable distribution (lenny), this problem has been fixed in version 2.6.32.dfsg-5+lenny4.

For the stable distribution (squeeze), this problem has been fixed in version 2.7.8.dfsg-2+squeeze1.

For the unstable distribution (sid), this problem has been fixed in version 2.7.8.dfsg-3.

We recommend that you upgrade your libxml2 packages.