Vulnerabilities > CVE-2007-6284 - Resource Management Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBXML2-4841.NASL
    descriptionlibxml2 contained a DoS condition in xmlCurrentChar()
    last seen2020-06-01
    modified2020-06-02
    plugin id30095
    published2008-01-27
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/30095
    titleopenSUSE 10 Security Update : libxml2 (libxml2-4841)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from openSUSE Security Update libxml2-4841.
    #
    # The text description of this plugin is (C) SUSE LLC.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(30095);
      script_version ("1.8");
      script_cvs_date("Date: 2019/10/25 13:36:30");
    
      script_cve_id("CVE-2007-6284");
    
      script_name(english:"openSUSE 10 Security Update : libxml2 (libxml2-4841)");
      script_summary(english:"Check for the libxml2-4841 patch");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote openSUSE host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "libxml2 contained a DoS condition in xmlCurrentChar()'s UTF-8
    processing. CVE-2007-6284 has been assigned to this problem."
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected libxml2 packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_cwe_id(399);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libxml2");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libxml2-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libxml2-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libxml2-devel-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libxml2-python");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.3");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/12/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2008/01/27");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2008-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
    if (release !~ "^(SUSE10\.1|SUSE10\.2|SUSE10\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.1 / 10.2 / 10.3", release);
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    ourarch = get_kb_item("Host/cpu");
    if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
    if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);
    
    flag = 0;
    
    if ( rpm_check(release:"SUSE10.1", reference:"libxml2-2.6.23-15.7.3") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"libxml2-devel-2.6.23-15.7.3") ) flag++;
    if ( rpm_check(release:"SUSE10.1", reference:"libxml2-python-2.6.23-15.5.3") ) flag++;
    if ( rpm_check(release:"SUSE10.1", cpu:"x86_64", reference:"libxml2-32bit-2.6.23-15.7.3") ) flag++;
    if ( rpm_check(release:"SUSE10.1", cpu:"x86_64", reference:"libxml2-devel-32bit-2.6.23-15.7.3") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"libxml2-2.6.26-28") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"libxml2-devel-2.6.26-28") ) flag++;
    if ( rpm_check(release:"SUSE10.2", reference:"libxml2-python-2.6.26-31") ) flag++;
    if ( rpm_check(release:"SUSE10.2", cpu:"x86_64", reference:"libxml2-32bit-2.6.26-28") ) flag++;
    if ( rpm_check(release:"SUSE10.2", cpu:"x86_64", reference:"libxml2-devel-32bit-2.6.26-28") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"libxml2-2.6.30-4.2") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"libxml2-devel-2.6.30-4.2") ) flag++;
    if ( rpm_check(release:"SUSE10.3", reference:"libxml2-python-2.6.30-4.2") ) flag++;
    if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"libxml2-32bit-2.6.30-4.2") ) flag++;
    if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"libxml2-devel-32bit-2.6.30-4.2") ) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "libxml2");
    }
    
  • NASL familyWindows
    NASL idVLC_0_8_6H.NASL
    descriptionThe version of VLC Media Player installed on the remote host reportedly includes versions of GnuTLS, libgcrypt, and libxml2 that are affected by various denial of service and buffer overflow vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id33278
    published2008-06-30
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/33278
    titleVLC Media Player < 0.8.6h Multiple Vulnerabilities
    code
    #
    #  (C) Tenable Network Security, Inc.
    #
    
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33278);
      script_version("1.11");
    
      script_cve_id("CVE-2008-1948", "CVE-2008-1949", "CVE-2008-1950", "CVE-2007-6284");
      script_bugtraq_id(27248, 29292);
    
      script_name(english:"VLC Media Player < 0.8.6h Multiple Vulnerabilities");
      script_summary(english:"Checks version of VLC");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host contains a media player that is affected by
    several vulnerabilities." );
     script_set_attribute(attribute:"description", value:
    "The version of VLC Media Player installed on the remote host
    reportedly includes versions of GnuTLS, libgcrypt, and libxml2 that
    are affected by various denial of service and buffer overflow
    vulnerabilities." );
     script_set_attribute(attribute:"see_also", value:"http://www.videolan.org/developers/vlc/NEWS" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to VLC Media Player version 0.8.6h or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_cwe_id(189, 287, 399);
     script_set_attribute(attribute:"plugin_publication_date", value: "2008/06/30");
     script_cvs_date("Date: 2018/08/06 14:03:16");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:videolan:vlc_media_player");
    script_end_attributes();
    
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");
    
      script_dependencies("vlc_installed.nasl");
      script_require_keys("SMB/VLC/Version");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    
    
    ver = get_kb_item("SMB/VLC/Version");
    if (ver && tolower(ver) =~ "^0\.([0-7]\.|8\.([0-5]|6($|[a-g])))")
    {
      if (report_verbosity)
      {
        report = string(
          "\n",
          "VLC Media Player version ", ver, " is currently installed on the remote host.\n"
        );
        security_hole(port:get_kb_item("SMB/transport"), extra:report);
      }
      else security_hole(get_kb_item("SMB/transport"));
    }
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1461.NASL
    descriptionBrad Fitzpatrick discovered that the UTF-8 decoding functions of libxml2, the GNOME XML library, validate UTF-8 correctness insufficiently, which may lead to denial of service by forcing libxml2 into an infinite loop.
    last seen2020-06-01
    modified2020-06-02
    plugin id29938
    published2008-01-14
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29938
    titleDebian DSA-1461-1 : libxml2 - missing input validation
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2008-0462.NASL
    descriptionThis release fixes a potential Denial of Service attack on services using libxml2 to parse user provided XML. All users are invited to upgrade. Fixes CVE-2007-6284 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id29940
    published2008-01-14
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29940
    titleFedora 8 : libxml2-2.6.31-1.fc8 (2008-0462)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2008-0032.NASL
    descriptionUpdated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id29954
    published2008-01-14
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29954
    titleRHEL 2.1 / 3 / 4 / 5 : libxml2 (RHSA-2008:0032)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2008-0477.NASL
    descriptionThis release fixes a potential Denial of Service attack on services using libxml2 to parse user provided XML. All users are invited to upgrade. Fixes CVE-2007-6284 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id29943
    published2008-01-14
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29943
    titleFedora 7 : libxml2-2.6.31-1.fc7 (2008-0477)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12032.NASL
    descriptionlibxml2 contained a DoS condition in xmlCurrentChar()
    last seen2020-06-01
    modified2020-06-02
    plugin id41179
    published2009-09-24
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/41179
    titleSuSE9 Security Update : libxml2 (YOU Patch Number 12032)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20080111_LIBXML2_ON_SL3_X.NASL
    descriptionA denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284)
    last seen2020-06-01
    modified2020-06-02
    plugin id60342
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60342
    titleScientific Linux Security Update : libxml2 on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2008-0032.NASL
    descriptionFrom Red Hat Security Advisory 2008:0032 : Updated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id67637
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67637
    titleOracle Linux 3 / 4 / 5 : libxml2 (ELSA-2008-0032)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2008-0032.NASL
    descriptionUpdated libxml2 packages that fix a security issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team. The libxml2 packages provide a library that allows you to manipulate XML files. It includes support to read, modify, and write XML and HTML files. A denial of service flaw was found in the way libxml2 processes certain content. If an application linked against libxml2 processes malformed XML content, it could cause the application to stop responding. (CVE-2007-6284) Red Hat would like to thank the Google Security Team for responsibly disclosing this issue. All users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id29932
    published2008-01-14
    reporterThis script is Copyright (C) 2008-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29932
    titleCentOS 3 / 4 / 5 : libxml2 (CESA-2008:0032)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2009-0018.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - Add bug347316.patch to backport fix for bug#347316 from upstream version - Add libxml2-enterprise.patch and update logos in tarball - Fix a couple of crash (CVE-2009-2414, CVE-2009-2416) - Resolves: rhbz#515236 - two patches for size overflows problems (CVE-2008-4225, CVE-2008-4226) - Resolves: rhbz#470474 - Patch to fix an entity name copy buffer overflow (CVE-2008-3529) - Resolves: rhbz#461023 - Better fix for (CVE-2008-3281) - Resolves: rhbz#458095 - change the patch for CVE-2008-3281 due to ABI issues - Resolves: rhbz#458095 - Patch to fix recursive entities handling (CVE-2008-3281) - Resolves: rhbz#458095 - Patch to fix UTF-8 decoding problem (CVE-2007-6284) - Resolves: rhbz#425933
    last seen2020-06-01
    modified2020-06-02
    plugin id79462
    published2014-11-26
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79462
    titleOracleVM 2.1 : libxml2 (OVMSA-2009-0018)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200801-20.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200801-20 (libxml2: Denial of Service) Brad Fitzpatrick reported that the xmlCurrentChar() function does not properly handle some UTF-8 multibyte encodings. Impact : A remote attacker could entice a user to open a specially crafted XML document with an application using libxml2, possibly resulting in a high CPU consumption. Note that this vulnerability could also be triggered without user interaction by an automated system processing XML content. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id30137
    published2008-02-01
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/30137
    titleGLSA-200801-20 : libxml2: Denial of Service
  • NASL familySuSE Local Security Checks
    NASL idSUSE_LIBXML2-4840.NASL
    descriptionlibxml2 contained a DoS condition in xmlCurrentChar()
    last seen2020-06-01
    modified2020-06-02
    plugin id30094
    published2008-01-27
    reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/30094
    titleSuSE 10 Security Update : libxml2 (ZYPP Patch Number 4840)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2008-010.NASL
    descriptionA denial of service flaw was discovered by the Google Security Team in the way libxml2 processes malformed XML content. This flaw could cause the application to stop responding. The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id36842
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/36842
    titleMandriva Linux Security Advisory : libxml2 (MDVSA-2008:010)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2008-0006.NASL
    descriptionUpdated libxml2 package to address a denial of service flaw. Thanks to the Google security team for identifying and reporting this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-6284 to this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id40376
    published2009-07-27
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/40376
    titleVMSA-2008-0006 : Updated libxml2 service console package
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-569-1.NASL
    descriptionBrad Fitzpatrick discovered that libxml2 did not correctly handle certain UTF-8 sequences. If a remote attacker were able to trick a user or automated system into processing a specially crafted XML document, the application linked against libxml2 could enter an infinite loop, leading to a denial of service via CPU resource consumption. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id29979
    published2008-01-15
    reporterUbuntu Security Notice (C) 2008-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29979
    titleUbuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : libxml2 vulnerability (USN-569-1)

Oval

  • accepted2013-04-29T04:14:51.422-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
      ovaloval:org.mitre.oval:def:11831
    • commentCentOS Linux 4.x
      ovaloval:org.mitre.oval:def:16636
    • commentOracle Linux 4.x
      ovaloval:org.mitre.oval:def:15990
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
      ovaloval:org.mitre.oval:def:11414
    • commentThe operating system installed on the system is CentOS Linux 5.x
      ovaloval:org.mitre.oval:def:15802
    • commentOracle Linux 5.x
      ovaloval:org.mitre.oval:def:15459
    descriptionThe xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    familyunix
    idoval:org.mitre.oval:def:11594
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleThe xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    version27
  • accepted2008-03-24T04:00:40.950-04:00
    classvulnerability
    contributors
    namePai Peng
    organizationHewlett-Packard
    definition_extensions
    • commentSolaris 9 (SPARC) is installed
      ovaloval:org.mitre.oval:def:1457
    • commentSolaris 10 (SPARC) is installed
      ovaloval:org.mitre.oval:def:1440
    • commentSolaris 9 (x86) is installed
      ovaloval:org.mitre.oval:def:1683
    • commentSolaris 10 (x86) is installed
      ovaloval:org.mitre.oval:def:1926
    descriptionThe xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
    familyunix
    idoval:org.mitre.oval:def:5216
    statusaccepted
    submitted2008-02-12T08:48:33.000-05:00
    titleSecurity Vulnerability in the libxml2 Library May Lead to a Denial of Service (DoS)
    version36

Redhat

advisories
bugzilla
id425927
titleCVE-2007-6284 libxml2: infinite loop in UTF-8 decoding
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 4 is installed
      ovaloval:com.redhat.rhba:tst:20070304025
    • OR
      • AND
        • commentlibxml2-devel is earlier than 0:2.6.16-10.1
          ovaloval:com.redhat.rhsa:tst:20080032001
        • commentlibxml2-devel is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080032002
      • AND
        • commentlibxml2 is earlier than 0:2.6.16-10.1
          ovaloval:com.redhat.rhsa:tst:20080032003
        • commentlibxml2 is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080032004
      • AND
        • commentlibxml2-python is earlier than 0:2.6.16-10.1
          ovaloval:com.redhat.rhsa:tst:20080032005
        • commentlibxml2-python is signed with Red Hat master key
          ovaloval:com.redhat.rhsa:tst:20080032006
  • AND
    • commentRed Hat Enterprise Linux 5 is installed
      ovaloval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • commentlibxml2-devel is earlier than 0:2.6.26-2.1.2.1
          ovaloval:com.redhat.rhsa:tst:20080032008
        • commentlibxml2-devel is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080032009
      • AND
        • commentlibxml2-python is earlier than 0:2.6.26-2.1.2.1
          ovaloval:com.redhat.rhsa:tst:20080032010
        • commentlibxml2-python is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080032011
      • AND
        • commentlibxml2 is earlier than 0:2.6.26-2.1.2.1
          ovaloval:com.redhat.rhsa:tst:20080032012
        • commentlibxml2 is signed with Red Hat redhatrelease key
          ovaloval:com.redhat.rhsa:tst:20080032013
rhsa
idRHSA-2008:0032
released2008-01-11
severityImportant
titleRHSA-2008:0032: libxml2 security update (Important)
rpms
  • libxml2-0:2.4.19-7.ent
  • libxml2-0:2.5.10-8
  • libxml2-0:2.6.16-10.1
  • libxml2-0:2.6.26-2.1.2.1
  • libxml2-debuginfo-0:2.5.10-8
  • libxml2-debuginfo-0:2.6.16-10.1
  • libxml2-debuginfo-0:2.6.26-2.1.2.1
  • libxml2-devel-0:2.4.19-7.ent
  • libxml2-devel-0:2.5.10-8
  • libxml2-devel-0:2.6.16-10.1
  • libxml2-devel-0:2.6.26-2.1.2.1
  • libxml2-python-0:2.4.19-7.ent
  • libxml2-python-0:2.5.10-8
  • libxml2-python-0:2.6.16-10.1
  • libxml2-python-0:2.6.26-2.1.2.1

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 27248 CVE(CAN) ID: CVE-2007-6284 libxml2软件包提供允许用户操控XML文件的函数库,包含有读、修改和写XML和HTML文件支持。 libxml库在处理包含畸形数据的XML文件时存在漏洞,远程攻击者可能利用此漏洞导致系统不可用。 libxml库的UTF-8解码函数xmlCurrentChar()没有检查UTF-8的正确性,如果用户使用链接到该库的应用程序打开了包含有多字节组合的畸形XML内容的话,就会导致函数库陷入死循环挂起,消耗大量系统资源。 XMLSoft Libxml2 &lt; 2.6.31 Debian ------ Debian已经为此发布了一个安全公告(DSA-1461-1)以及相应补丁: DSA-1461-1:New libxml2 packages fix denial of service 链接:<a href=http://www.debian.org/security/2008/dsa-1461 target=_blank>http://www.debian.org/security/2008/dsa-1461</a> 补丁下载: Source archives: <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1.dsc target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1.dsc</a> Size/MD5 checksum: 884 991cf7cfdaf3ef05e95ec11f1b99b345 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1.diff.gz target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1.diff.gz</a> Size/MD5 checksum: 127107 b142c10e523b8d72ec427382849f2d39 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16.orig.tar.gz target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16.orig.tar.gz</a> Size/MD5 checksum: 4008551 7b28b412498625b51d86e58e30fbdd31 Architecture independent packages: <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.16-7sarge1_all.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.16-7sarge1_all.deb</a> Size/MD5 checksum: 17242 ebfb4ef8a14dec1a34ad62fe6955afef <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-python2.3_2.6.16-7sarge1_all.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-python2.3_2.6.16-7sarge1_all.deb</a> Size/MD5 checksum: 10850 7a426e3c11a74852fc695612e2bfca25 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-doc_2.6.16-7sarge1_all.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-doc_2.6.16-7sarge1_all.deb</a> Size/MD5 checksum: 930164 e4458eaa1f1080dfe1745a92c8f667e5 alpha architecture (DEC Alpha) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 178380 39cec4bba77bc3aef4aefd5f7303470d <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 178364 2ce12c73236c4c341b358c92b198dbae <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 177434 0fb0c05e5397d45ef0f3b46ade61b9a5 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 32144 a8e00165ef4f0394e56b19d5b53689c2 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 693524 6d2d2b24908645d3e7eb18a2a68f55bf <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_alpha.deb</a> Size/MD5 checksum: 797876 d1f891c9bc973625fe9630417d1736c8 amd64 architecture (AMD x86_64 (AMD64)) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 639976 c7e4f773476dcd7160db8f7dde721acc <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 177492 036dac53f32c6de1687db56091ce7053 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 629976 57128d940cbf7a3c7b0fc33c959a4412 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 176350 bb18c925d5ac4a32b9671b2d10a5a3ec <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 30478 f089b56d3a85b90aaef374e7334670f6 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_amd64.deb</a> Size/MD5 checksum: 177470 299fbaab814c6602dbe828be31857703 arm architecture (ARM) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 159118 37b60276f1605a208923b20b5b35e937 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 28364 ede14581faef3f86c970a1d1c1e0fc4b <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 157942 940113a10f6a77a2393010ea7ebbdc8e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 159142 edbf498c3d5224ff5988f4e5e506781d <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 584958 6ad2bd0b2d9b0c5ec581f1ded97b368d <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_arm.deb</a> Size/MD5 checksum: 659776 6faa760c520074913612c6c04f13c391 hppa architecture (HP PA RISC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 185554 813b9d2c5f8b142359cda44718797033 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 691512 66f6713fed2673a7c65499bc3948d88d <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 30762 ddd5dfa0add92fb1a45d8b5c9f330612 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 185578 605633ecf2334e8f7620d8a8fe32b4ca <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 721798 55ca114ed3e1fb0ae159cab73d5aad1e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_hppa.deb</a> Size/MD5 checksum: 184294 6cdf988e87065a5205721e6116c0434c i386 architecture (Intel ia32) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 591050 5143284e844b0806c7ca9fdbdc17564a <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 162230 253df68abbc124c535a660b97aaa4297 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 163274 02c5664ef3a4855a62d30713661dec97 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 28226 f791765de50d84da4e657a638f6c7724 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 163262 b8bd4effcff791316e0b3650db191d26 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_i386.deb</a> Size/MD5 checksum: 602092 083c076ddea6f81c19af79e6a622a83c ia64 architecture (Intel ia64) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 185194 5a864b2d70dde6d4ffa8cdd8aadbe413 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 842344 86d7e89b56255cae370aefeeeb96d0e8 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 183904 62e2b5ed12e59e2368fb45f56d83c941 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 38540 9f34df8ef2e01216cc8a5fa08b4f8916 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 185202 9064c2260585e95a60cce48b4d74061c <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_ia64.deb</a> Size/MD5 checksum: 920016 bdc8c365fb1da5622994713cb89a47c9 mips architecture (MIPS (Big Endian)) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 609946 5e1f1e4202a3e7e9634392adfdad07fe <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 163220 a08fa2094cb4f39377afb287ce5229d1 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 700974 628e1ec484bc7ce129fad1515c8b5783 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 162038 3a45da812a45d8d85d33b5f3840fae3f <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 163234 0b1cc66b99d312fa45e66b7b87096b54 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_mips.deb</a> Size/MD5 checksum: 29496 3f4fa64beef55f29b03edf2996fd8dd3 powerpc architecture (PowerPC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 165682 5ad90c7182dde3d3cf174d00137df9bd <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 632382 992847eaea206f7d712b3036f09d82aa <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 166908 d3caf8e62750c3b9df18b5364317d6de <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 31988 27f4605932172e075e73aecb6b37f860 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 166896 3993311ca8340ec597563e80e8ae04f6 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_powerpc.deb</a> Size/MD5 checksum: 681998 f0286ca7b57c2d130afb87a2e7f55903 s390 architecture (IBM S/390) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 183942 efa98b27ad26269269f116179a4181a0 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 637590 68a43b7225a3ff9750e47b2ce8fafbff <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 30400 e68e4ddeab759336fea8bdae170a98ae <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 183954 b44b12173c11bae11097e824090d637e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 182594 59901b903a43b00b9a4a812138fa5110 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_s390.deb</a> Size/MD5 checksum: 649804 22e69a23cd59d0469ed45c07a6c4415c sparc architecture (Sun SPARC/UltraSPARC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 29200 7fae0af3ee437f1033b50b42d9291a52 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 623322 f0852fd2bdd47faedb17501f9a3354d2 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 614266 9d755c02d262c4ec9adad8397d436849 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.4-libxml2_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 171374 b8e62a9c54a25427a92542eeecfa0738 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.3-libxml2_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 171392 5b9ca6662c35ea726786c8b155adcec0 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python2.2-libxml2_2.6.16-7sarge1_sparc.deb</a> Size/MD5 checksum: 170388 05873d9dabafcbf0e83c46406a48709e Debian 4.0 (stable) - ------------------- Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg.orig.tar.gz target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg.orig.tar.gz</a> Size/MD5 checksum: 3416175 5ff71b22f6253a6dd9afc1c34778dec3 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2.diff.gz target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2.diff.gz</a> Size/MD5 checksum: 142579 2bfdb7f543d1bb2c113056ba7c47a8fa <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2.dsc target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2.dsc</a> Size/MD5 checksum: 893 ac5bb60fd79506befb89e6d63bb81d45 Architecture independent packages: <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-doc_2.6.27.dfsg-2_all.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-doc_2.6.27.dfsg-2_all.deb</a> Size/MD5 checksum: 1292456 add37f996a875359e75ecae4c9bef721 alpha architecture (DEC Alpha) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_alpha.deb</a> Size/MD5 checksum: 37982 bd804f474a937b035ba1d4ae93beef1f <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_alpha.deb</a> Size/MD5 checksum: 916190 97cf9a61c0468acef543c6b493089705 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_alpha.deb</a> Size/MD5 checksum: 184462 32bb058f96ccdf3d96d8ab98877cbdfd <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_alpha.deb</a> Size/MD5 checksum: 819852 e49620aaf549e0f42daafe19446b3697 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_alpha.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_alpha.deb</a> Size/MD5 checksum: 882770 6ead0a0d5a8d0ae0b68bd363698e90a1 amd64 architecture (AMD x86_64 (AMD64)) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_amd64.deb</a> Size/MD5 checksum: 36782 16832b84e2ce688cbbd76ffd4166784a <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_amd64.deb</a> Size/MD5 checksum: 890410 fe49261529663335d74be60721367d12 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_amd64.deb</a> Size/MD5 checksum: 182914 94d2d0c1dfa0be939e7b4904791533d8 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_amd64.deb</a> Size/MD5 checksum: 745942 53e57327592b75b05c9eee7b38411a00 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_amd64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_amd64.deb</a> Size/MD5 checksum: 795816 a2c97e1d523794671a634c54f8138d99 arm architecture (ARM) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_arm.deb</a> Size/MD5 checksum: 34676 6b5aab661fa339dc4e7ef170188ed38b <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_arm.deb</a> Size/MD5 checksum: 816410 5f275d04567bb4ff2cdf33b6982d1e5f <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_arm.deb</a> Size/MD5 checksum: 740760 1b7e6e93b930ff32555b10eff05283d4 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_arm.deb</a> Size/MD5 checksum: 672372 18ab49b2dcb50a31d7c25ddc3823326c <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_arm.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_arm.deb</a> Size/MD5 checksum: 165292 d3ab4deccf39fdca6006696dd3c3f963 hppa architecture (HP PA RISC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_hppa.deb</a> Size/MD5 checksum: 36852 7738d949e025d84c5667d53c9cf403f3 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_hppa.deb</a> Size/MD5 checksum: 864108 e3a94508a260d4f991eb8918e6f6584e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_hppa.deb</a> Size/MD5 checksum: 191966 b9d90fa3f9a973bfe2842b5f3208d591 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_hppa.deb</a> Size/MD5 checksum: 856828 ef1afa089d983f53fa079a994e6fab58 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_hppa.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_hppa.deb</a> Size/MD5 checksum: 849018 0ebc8e2a0e3d20d7f934bd2ddf0f003e i386 architecture (Intel ia32) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_i386.deb</a> Size/MD5 checksum: 755368 3fc87d8fc0659e1d018ffbb59ac8aae1 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_i386.deb</a> Size/MD5 checksum: 856908 fbc44fb4865f19f7fcb283ec99b53ba6 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_i386.deb</a> Size/MD5 checksum: 680886 733b4aa48f453a2d140a9aa57ee3f314 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_i386.deb</a> Size/MD5 checksum: 169040 a9f98e8d028167654639d90e03181187 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_i386.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_i386.deb</a> Size/MD5 checksum: 34494 0282972a80e337f0992dcb4106b8122b ia64 architecture (Intel ia64) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_ia64.deb</a> Size/MD5 checksum: 48486 34b3f19c4ce8bed2ba28128afc742377 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_ia64.deb</a> Size/MD5 checksum: 196532 af8e2034ea28de239a6bc4584511a545 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_ia64.deb</a> Size/MD5 checksum: 1105058 8fc89d88515989c16c6372f6d5014ce3 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_ia64.deb</a> Size/MD5 checksum: 873228 1fbadfd4d88d5e9060ef05ef1442ef0a <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_ia64.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_ia64.deb</a> Size/MD5 checksum: 1078832 0d42237d6e8a124c6a041a2a6b13055a mips architecture (MIPS (Big Endian)) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_mips.deb</a> Size/MD5 checksum: 34424 5c6fb6b9d2bddb99a34eda06eabca56e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_mips.deb</a> Size/MD5 checksum: 840438 a2c9843b6e015b52db01bc2e3c9eb396 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_mips.deb</a> Size/MD5 checksum: 171630 5ba55f80321214ee0eed2bb7b8a10b64 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_mips.deb</a> Size/MD5 checksum: 769422 87c44cc7652046131abfcc9e8345afc6 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_mips.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_mips.deb</a> Size/MD5 checksum: 925916 90b551e4742f9fc704f0d48362f0caf8 powerpc architecture (PowerPC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_powerpc.deb</a> Size/MD5 checksum: 172728 c1571f184ce56c5ddd7dc5566d92a7ed <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_powerpc.deb</a> Size/MD5 checksum: 770242 7d21dccba9d10e96cdd8ce1ed79b3466 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_powerpc.deb</a> Size/MD5 checksum: 779176 1b2d9ccc35217fec472a3db390ca2956 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_powerpc.deb</a> Size/MD5 checksum: 896976 7024c07f1b0f910437513ba6f5bd7878 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_powerpc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_powerpc.deb</a> Size/MD5 checksum: 37662 3d6896da0ac4aaf7f9f239a4f9a3a516 s390 architecture (IBM S/390) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_s390.deb</a> Size/MD5 checksum: 749440 d4bf85450d358fc299df52c7c742cc24 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_s390.deb</a> Size/MD5 checksum: 884816 f174f9cc572a465b494d9403d76b3c9d <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_s390.deb</a> Size/MD5 checksum: 805010 42eb2a1f87ceb6cabfa8ba23e3c27b1e <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_s390.deb</a> Size/MD5 checksum: 36370 3b564945daf64add099b143a631e3f25 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_s390.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_s390.deb</a> Size/MD5 checksum: 185722 4a0ad6d068a460806422f096c21c7197 sparc architecture (Sun SPARC/UltraSPARC) <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2_2.6.27.dfsg-2_sparc.deb</a> Size/MD5 checksum: 759128 41f8e81199b7b3b8c2b55034d4bc5a54 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dev_2.6.27.dfsg-2_sparc.deb</a> Size/MD5 checksum: 712498 2f279ec5bd2b8427e1254f0fba9bdec7 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-dbg_2.6.27.dfsg-2_sparc.deb</a> Size/MD5 checksum: 781060 8c7c1b07b375f1de81f9273cec6c1d26 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/python-libxml2_2.6.27.dfsg-2_sparc.deb</a> Size/MD5 checksum: 176868 45fa6a0155f48ebac9e5f5a85db9fba1 <a href=http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_sparc.deb target=_blank>http://security.debian.org/pool/updates/main/libx/libxml2/libxml2-utils_2.6.27.dfsg-2_sparc.deb</a> Size/MD5 checksum: 34572 b310e0a4f223bbdcba80c46eb09a1c92 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2008:0032-01)以及相应补丁: RHSA-2008:0032-01:Important: libxml2 security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2008-0032.html target=_blank>https://www.redhat.com/support/errata/RHSA-2008-0032.html</a> Sun --- Sun已经为此发布了一个安全公告(Sun-Alert-103201)以及相应补丁: Sun-Alert-103201:Security Vulnerability in the libxml2 Library may Lead to a Denial of Service (DoS) 链接:<a href=http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-103201-1 target=_blank>http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-103201-1</a> XMLSoft ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://veillard.com/libxml2.patch target=_blank>http://veillard.com/libxml2.patch</a>
idSSV:2824
last seen2017-11-19
modified2008-01-16
published2008-01-16
reporterRoot
titlelibxml2 xmlCurrentChar()函数UTF-8解析远程拒绝服务漏洞

References