Linux Security
    Linux Security
    Linux Security

    Debian: New libxml2 packages fix denial of service

    Date 22 Aug 2008
    Posted By LinuxSecurity Advisories
    Andreas Solberg discovered that libxml2, the GNOME XML library, could be forced to recursively evaluate entities, until available CPU & memory resources were exhausted.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1631-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.                               Steve Kemp
    August 22, 2008             
    - ------------------------------------------------------------------------
    Package        : libxml2
    Vulnerability  : denial of service
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2008-3281
    Andreas Solberg discovered that libxml2, the GNOME XML library,
    could be forced to recursively evaluate entities, until available
    CPU & memory resources were exhausted.
    For the stable distribution (etch), this problem has been fixed in version
    For the unstable distribution (sid), this problem will be fixed soon.
    We recommend that you upgrade your libxml2 package.
    Upgrade instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    Source archives:
        Size/MD5 checksum:  3416175 5ff71b22f6253a6dd9afc1c34778dec3
        Size/MD5 checksum:      901 800082d165a5627f571f019994bee93c
        Size/MD5 checksum:   146017 10fc8479d96fb23d17ac8a51bfe40db9
    Architecture independent packages:
        Size/MD5 checksum:  1325318 11e64cd82ae7b549fa975a657f773f73
    alpha architecture (DEC Alpha)
        Size/MD5 checksum:    37976 909bab48a2b4a6c29e11b8b880dd464d
        Size/MD5 checksum:   184758 2dbe0e48211dff90726296ee6786b73b
        Size/MD5 checksum:   881704 110adb2bde79f8feb121beaa9ae8e15d
        Size/MD5 checksum:   916192 fd97550bc89ee18ef4c58da00b2c8b1c
        Size/MD5 checksum:   820740 47ba8095722f2bbdf6e88fa6881b365e
    amd64 architecture (AMD x86_64 (AMD64))
        Size/MD5 checksum:    36774 78fbbff7c5a940d516ddab2145af3a04
        Size/MD5 checksum:   891114 54574b53e6e1d243c9a3a8db7a7ff845
        Size/MD5 checksum:   182908 28cfebcd7ab010cf63e9261147be9806
        Size/MD5 checksum:   746356 96ee63f89da370e08d4d7cf2d656c414
        Size/MD5 checksum:   796450 d9e1bc7ac6e9ac08a50e4cc7fd245433
    arm architecture (ARM)
        Size/MD5 checksum:   672716 21723fdd5875eb16170ec69734fa4cd4
        Size/MD5 checksum:   165296 091714fdcb9c7c7909496ac14d9af71d
        Size/MD5 checksum:    34676 d1acb4cd2a7036e35a7cfbcdc25362b7
        Size/MD5 checksum:   816944 102757770541cb1d1336bb4d3c086aa8
        Size/MD5 checksum:   741122 35af939918be6655ca6994462a3b9610
    hppa architecture (HP PA RISC)
        Size/MD5 checksum:   192856 0f670bcbefb06ace1dcd643e4045d5ce
        Size/MD5 checksum:   857960 cc1632c8c04e9582e79e46729ce6657b
        Size/MD5 checksum:    36856 35450be2eee5c16c4ac8b230b8d67de5
        Size/MD5 checksum:   863890 fd6b47e9995c8150fe0d42036de52b92
        Size/MD5 checksum:   849758 3199a4ab9ce81877235f78c611f0ae4e
    i386 architecture (Intel ia32)
        Size/MD5 checksum:   857370 6a293fc2b6aeadb289e28a4566fbfc86
        Size/MD5 checksum:   681830 2117114ebcaa25a76d21c454df990789
        Size/MD5 checksum:   755986 7291a82a169cd4fa7b0d3347685fb3ad
        Size/MD5 checksum:    34456 092ad89155004c50686cafca63b9257b
        Size/MD5 checksum:   169520 55365fa5e3fe422f0c09492d8289db6b
    ia64 architecture (Intel ia64)
        Size/MD5 checksum:  1079332 09539a6412b3723ae3a5cda3c3ad9909
        Size/MD5 checksum:   196528 72eee7603a33f7f06046fed3a7cd19e3
        Size/MD5 checksum:  1105612 e3ac30716a2199d3c37f50ae7ab1bdc3
        Size/MD5 checksum:   873890 f3d98ef2b14a8e48a8f8c44ced776b62
        Size/MD5 checksum:    48492 629a7c71342c5b380fc3e72c7bb8ad16
    mipsel architecture (MIPS (Little Endian))
        Size/MD5 checksum:   168694 adce98b5257168bdb17c8a7aa0e60131
        Size/MD5 checksum:   832722 cea7eaeb7952fa2c204803f004a23c79
        Size/MD5 checksum:   768330 94bb5ac441e8ed3b8f14ca21fdcf7b5a
        Size/MD5 checksum:   897532 ffeec2f653021b3423f9d94610ca522f
        Size/MD5 checksum:    34404 3b43ed7f884ba01176d6dc9ee8c0ca54
    powerpc architecture (PowerPC)
        Size/MD5 checksum:   897856 b5eacbc0ea09978b887707ed9b23fabb
        Size/MD5 checksum:   779568 55f1f4ed3bdb39bc8bc59d74992b91e6
        Size/MD5 checksum:    37658 0920a98fef39eabeffc2e6f4083ad6d5
        Size/MD5 checksum:   770592 196fb7a7f7636cb5e350a97c4e06c020
        Size/MD5 checksum:   172722 64c1948d58bbf8b9094234715fca2509
    s390 architecture (IBM S/390)
        Size/MD5 checksum:   749806 20d00f95a218a47daae2a86342e3222e
        Size/MD5 checksum:   885108 5ca88f61170d06854c9c1d9a86f3798d
        Size/MD5 checksum:   185726 bdfda7d18d0d0cc5d992e8548ed637f1
        Size/MD5 checksum:    36364 9c3b2e9ac8e781bc990616d752752861
        Size/MD5 checksum:   805446 f11839b2b45fc83a7972b867094773b2
    sparc architecture (Sun SPARC/UltraSPARC)
        Size/MD5 checksum:   781288 3326281769c76631f973ff41682ab4ad
        Size/MD5 checksum:   176878 60eba89a0a740429b8a8726ebcd175f1
        Size/MD5 checksum:    34578 34b4efd5a8b68a33b85ada99757f824a
        Size/MD5 checksum:   759292 a8e8ea8c000c365ecd2c6a04f0f748d3
        Size/MD5 checksum:   712758 921af536cdc8ddd105768c4061aa2f3e
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.