Description: | Description:
The remote host is missing an update to libxml2 announced via advisory FEDORA-2008-9773.
Update Information:
Fixes a couple of security issues when overflowing text data size of buffer size.
ChangeLog:
* Wed Nov 12 2008 Daniel Veillard - 2.7.2-2.fc9 - two patches for size overflows problems CVE-2008-4225 and CVE-2008-4226 * Tue Oct 7 2008 Daniel Veillard 2.7.2-1.fc9 - new release 2.7.2 - Fixes the known problems in 2.7.1 - increase the set of options when saving documents * Thu Oct 2 2008 Daniel Veillard 2.7.1-2.fc9 - fix a nasty bug in 2.7.x, http://bugzilla.gnome.org/show_bug.cgi?id=554660
References:
[ 1 ] Bug #470480 - CVE-2008-4225 libxml2: integer overflow leading to infinite loop in xmlBufferResize https://bugzilla.redhat.com/show_bug.cgi?id=470480 [ 2 ] Bug #470466 - CVE-2008-4226 libxml2: integer overflow leading to memory corruption in xmlSAX2Characters https://bugzilla.redhat.com/show_bug.cgi?id=470466
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update libxml2' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-9773
Risk factor : Critical
CVSS Score: 10.0
|