[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 535-1] xerces-c security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : xerces-c
Version        : 3.1.1-3+deb7u4
CVE ID         : CVE-2016-4463
Debian Bug     : 828990

Brandon Perry discovered that xerces-c, a validating XML parser library
for C++, fails to successfully parse a DTD that is deeply nested,
causing a stack overflow. A remote unauthenticated attacker can take
advantage of this flaw to cause a denial of service against applications
using the xerces-c library.

Additionally this update includes an enhancement to enable applications
to fully disable DTD processing through the use of an environment
variable (XERCES_DISABLE_DTD).

For Debian 7 "Wheezy", these problems have been fixed in version
3.1.1-3+deb7u4.

We recommend that you upgrade your xerces-c packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=cSWi
-----END PGP SIGNATURE-----


Reply to: