[SECURITY] [DLA 535-1] xerces-c security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : xerces-c
Version : 3.1.1-3+deb7u4
CVE ID : CVE-2016-4463
Debian Bug : 828990
Brandon Perry discovered that xerces-c, a validating XML parser library
for C++, fails to successfully parse a DTD that is deeply nested,
causing a stack overflow. A remote unauthenticated attacker can take
advantage of this flaw to cause a denial of service against applications
using the xerces-c library.
Additionally this update includes an enhancement to enable applications
to fully disable DTD processing through the use of an environment
variable (XERCES_DISABLE_DTD).
For Debian 7 "Wheezy", these problems have been fixed in version
3.1.1-3+deb7u4.
We recommend that you upgrade your xerces-c packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=cSWi
-----END PGP SIGNATURE-----
Reply to: