—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
– ————————————————————————-
Debian Security Advisory DSA-2978-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 11, 2014 http://www.debian.org/security/faq
– ————————————————————————-
Package : libxml2
CVE ID : CVE-2014-0191
Daniel P. Berrange discovered a denial of service vulnerability in
libxml2 entity substitution.
For the stable distribution (wheezy), this problem has been fixed in
version 2.8.0+dfsg1-7+wheezy1.
For the unstable distribution (sid), this problem has been fixed in
version 2.9.1+dfsg1-4.
We recommend that you upgrade your libxml2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=NG04
—–END PGP SIGNATURE—–
—
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of “unsubscribe”. Trouble? Contact listmaster@lists.debian.org
Archive: https://lists.debian.org/20140711142953.GB4015@pisco.westfalen.local