Summary: | dev-libs/libxml2: Remotely exploitable buffer overflow | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Dan Margolis (RETIRED) <krispykringle> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | critical | CC: | gnome |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.securityfocus.com/archive/1/379383/2004-10-24/2004-10-30/0 | ||
Whiteboard: | A1 [glsa] lewk | ||
Package list: | Runtime testing required: | --- |
Description
Dan Margolis (RETIRED)
![]() gnome herd, 2.6.15 was released yesterday to fix these issues, please bump. added libxml2-2.6.15-r1 Arches, please test and mark stable sparc stable. stable on amd64 Stable on ppc. arm/ia64/s390 stable hppa wont happen until binutils-2.15.92.0.2 goes stable for hppa ... and we really havent had much time to test it :/ Stable on alpha. this seems to be CAN-2004-0989 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989> ppc64: please mark stable so that the GLSA can go out. stable on ppc64. Markus GLSA 200411-05 hppa, mips : please mark stable to benefit from GLSA Stable on mips. |