DSA-3579-1 xerces-c -- security update

Related Vulnerabilities: CVE-2016-2099  

Gustavo Grieco discovered an use-after-free vulnerability in xerces-c, a validating XML parser library for C++, due to not properly handling invalid characters in XML input documents in the DTDScanner. For the stable distribution (jessie), this problem has been fixed in version 3.1.1-5.1+deb8u2. For the testing distribution (stretch), this problem has been fixed in version 3.1.3+debian-2. For the unstable distribution (sid), this problem has been fixed in version 3.1.3+debian-2. We recommend that you upgrade your xerces-c packages.

Debian Security Advisory

DSA-3579-1 xerces-c -- security update

Date Reported:
16 May 2016
Affected Packages:
xerces-c
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 823863.
In Mitre's CVE dictionary: CVE-2016-2099.
More information:

Gustavo Grieco discovered an use-after-free vulnerability in xerces-c, a validating XML parser library for C++, due to not properly handling invalid characters in XML input documents in the DTDScanner.

For the stable distribution (jessie), this problem has been fixed in version 3.1.1-5.1+deb8u2.

For the testing distribution (stretch), this problem has been fixed in version 3.1.3+debian-2.

For the unstable distribution (sid), this problem has been fixed in version 3.1.3+debian-2.

We recommend that you upgrade your xerces-c packages.