Debian Security Advisory
DSA-2255-1 libxml2 -- buffer overflow
- Date Reported:
- 06 Jun 2011
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 628537.
- More information:
Chris Evans discovered that libxml was vulnerable to buffer overflows, which allowed a crafted XML input file to potentially execute arbitrary code.
For the oldstable distribution (lenny), this problem has been fixed in version 2.6.32.dfsg-5+lenny4.
For the stable distribution (squeeze), this problem has been fixed in version 2.7.8.dfsg-2+squeeze1.
For the unstable distribution (sid), this problem has been fixed in version 2.7.8.dfsg-3.
We recommend that you upgrade your libxml2 packages.