Above report claims exploitable buffer overflow requiring the application using libxml2 to parse untrusted xml or for the attacker to own/spoof DNS for the victim.
gnome herd, 2.6.15 was released yesterday to fix these issues, please bump.
added libxml2-2.6.15-r1
Arches, please test and mark stable
sparc stable.
stable on amd64
Stable on ppc.
arm/ia64/s390 stable hppa wont happen until binutils-2.15.92.0.2 goes stable for hppa ... and we really havent had much time to test it :/
Stable on alpha.
this seems to be CAN-2004-0989 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989>
ppc64: please mark stable so that the GLSA can go out.
stable on ppc64. Markus
GLSA 200411-05 hppa, mips : please mark stable to benefit from GLSA
Stable on mips.