http://www.debian.org/
May 01, 2015 http://www.debian.org/
- ------------------------------
Package : libxml-libxml-perl
CVE ID : CVE-2015-3451
Debian Bug : 783443
Tilmann Haak from xing.com discovered that XML::LibXML, a Perl interface
to the libxml2 library, did not respect the expand_entities parameter to
disable processing of external entities in some circumstances. This may
allow attackers to gain read access to otherwise protected ressources,
depending on how the library is used.
For the oldstable distribution (wheezy), this problem has been fixed
in version 2.0001+dfsg-1+deb7u1.
For the stable distribution (jessie), this problem has been fixed in
version 2.0116+dfsg-1+deb8u1.
For the unstable distribution (sid), this problem has been fixed in
version 2.0116+dfsg-2.
We recommend that you upgrade your libxml-libxml-perl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/
Mailing list: debian-security-announce@
Komentarų nėra:
Rašyti komentarą