Hi,
* Pascal Volk <[EMAIL PROTECTED]> [2008-01-12 04:04]:
> Package: libxml2
> Version: 2.6.30.dfsg-3
> Severity: normal
> 
> A vulnerability has been reported in libxml2, prior to version 2.6.31, from
> Daniel Veillard:
> "Two specially crafted broken UTF-8 sequences when occuring at the wrong
> place lead the parser to go into an infinite loop."
> The report is available at:
>     http://mail.gnome.org/archives/xml/2008-January/msg00036.html
> 
> A patch can be found at:
>     http://veillard.com/libxml2.patch
> The fixed source code can be downloaded from:
>     ftp://xmlsoft.org/libxml/libxml2-2.6.31.tar.gz

Is there any service using libxml2? If not I would consider 
this a normal bug rather than a security issue.
Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpOfRicQz97Y.pgp
Description: PGP signature

Reply via email to