Linux Security
Linux Security
Linux Security

Debian: New libxml2 packages fix denial of service

Date 22 Aug 2008
Posted By LinuxSecurity Advisories
Andreas Solberg discovered that libxml2, the GNOME XML library, could be forced to recursively evaluate entities, until available CPU & memory resources were exhausted.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1631-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
August 22, 2008             
- ------------------------------------------------------------------------

Package        : libxml2
Vulnerability  : denial of service
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-3281

Andreas Solberg discovered that libxml2, the GNOME XML library,
could be forced to recursively evaluate entities, until available
CPU & memory resources were exhausted.

For the stable distribution (etch), this problem has been fixed in version

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your libxml2 package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:
    Size/MD5 checksum:  3416175 5ff71b22f6253a6dd9afc1c34778dec3
    Size/MD5 checksum:      901 800082d165a5627f571f019994bee93c
    Size/MD5 checksum:   146017 10fc8479d96fb23d17ac8a51bfe40db9

Architecture independent packages:
    Size/MD5 checksum:  1325318 11e64cd82ae7b549fa975a657f773f73

alpha architecture (DEC Alpha)
    Size/MD5 checksum:    37976 909bab48a2b4a6c29e11b8b880dd464d
    Size/MD5 checksum:   184758 2dbe0e48211dff90726296ee6786b73b
    Size/MD5 checksum:   881704 110adb2bde79f8feb121beaa9ae8e15d
    Size/MD5 checksum:   916192 fd97550bc89ee18ef4c58da00b2c8b1c
    Size/MD5 checksum:   820740 47ba8095722f2bbdf6e88fa6881b365e

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:    36774 78fbbff7c5a940d516ddab2145af3a04
    Size/MD5 checksum:   891114 54574b53e6e1d243c9a3a8db7a7ff845
    Size/MD5 checksum:   182908 28cfebcd7ab010cf63e9261147be9806
    Size/MD5 checksum:   746356 96ee63f89da370e08d4d7cf2d656c414
    Size/MD5 checksum:   796450 d9e1bc7ac6e9ac08a50e4cc7fd245433

arm architecture (ARM)
    Size/MD5 checksum:   672716 21723fdd5875eb16170ec69734fa4cd4
    Size/MD5 checksum:   165296 091714fdcb9c7c7909496ac14d9af71d
    Size/MD5 checksum:    34676 d1acb4cd2a7036e35a7cfbcdc25362b7
    Size/MD5 checksum:   816944 102757770541cb1d1336bb4d3c086aa8
    Size/MD5 checksum:   741122 35af939918be6655ca6994462a3b9610

hppa architecture (HP PA RISC)
    Size/MD5 checksum:   192856 0f670bcbefb06ace1dcd643e4045d5ce
    Size/MD5 checksum:   857960 cc1632c8c04e9582e79e46729ce6657b
    Size/MD5 checksum:    36856 35450be2eee5c16c4ac8b230b8d67de5
    Size/MD5 checksum:   863890 fd6b47e9995c8150fe0d42036de52b92
    Size/MD5 checksum:   849758 3199a4ab9ce81877235f78c611f0ae4e

i386 architecture (Intel ia32)
    Size/MD5 checksum:   857370 6a293fc2b6aeadb289e28a4566fbfc86
    Size/MD5 checksum:   681830 2117114ebcaa25a76d21c454df990789
    Size/MD5 checksum:   755986 7291a82a169cd4fa7b0d3347685fb3ad
    Size/MD5 checksum:    34456 092ad89155004c50686cafca63b9257b
    Size/MD5 checksum:   169520 55365fa5e3fe422f0c09492d8289db6b

ia64 architecture (Intel ia64)
    Size/MD5 checksum:  1079332 09539a6412b3723ae3a5cda3c3ad9909
    Size/MD5 checksum:   196528 72eee7603a33f7f06046fed3a7cd19e3
    Size/MD5 checksum:  1105612 e3ac30716a2199d3c37f50ae7ab1bdc3
    Size/MD5 checksum:   873890 f3d98ef2b14a8e48a8f8c44ced776b62
    Size/MD5 checksum:    48492 629a7c71342c5b380fc3e72c7bb8ad16

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:   168694 adce98b5257168bdb17c8a7aa0e60131
    Size/MD5 checksum:   832722 cea7eaeb7952fa2c204803f004a23c79
    Size/MD5 checksum:   768330 94bb5ac441e8ed3b8f14ca21fdcf7b5a
    Size/MD5 checksum:   897532 ffeec2f653021b3423f9d94610ca522f
    Size/MD5 checksum:    34404 3b43ed7f884ba01176d6dc9ee8c0ca54

powerpc architecture (PowerPC)
    Size/MD5 checksum:   897856 b5eacbc0ea09978b887707ed9b23fabb
    Size/MD5 checksum:   779568 55f1f4ed3bdb39bc8bc59d74992b91e6
    Size/MD5 checksum:    37658 0920a98fef39eabeffc2e6f4083ad6d5
    Size/MD5 checksum:   770592 196fb7a7f7636cb5e350a97c4e06c020
    Size/MD5 checksum:   172722 64c1948d58bbf8b9094234715fca2509

s390 architecture (IBM S/390)
    Size/MD5 checksum:   749806 20d00f95a218a47daae2a86342e3222e
    Size/MD5 checksum:   885108 5ca88f61170d06854c9c1d9a86f3798d
    Size/MD5 checksum:   185726 bdfda7d18d0d0cc5d992e8548ed637f1
    Size/MD5 checksum:    36364 9c3b2e9ac8e781bc990616d752752861
    Size/MD5 checksum:   805446 f11839b2b45fc83a7972b867094773b2

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:   781288 3326281769c76631f973ff41682ab4ad
    Size/MD5 checksum:   176878 60eba89a0a740429b8a8726ebcd175f1
    Size/MD5 checksum:    34578 34b4efd5a8b68a33b85ada99757f824a
    Size/MD5 checksum:   759292 a8e8ea8c000c365ecd2c6a04f0f748d3
    Size/MD5 checksum:   712758 921af536cdc8ddd105768c4061aa2f3e

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"52","type":"x","order":"1","pct":80,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"8","type":"x","order":"2","pct":12.31,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":7.69,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.