DSA-3493-1 xerces-c -- security update

Related Vulnerabilities: CVE-2016-0729  

Gustavo Grieco discovered that xerces-c, a validating XML parser library for C++, mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting. These flaws could lead to a denial of service in applications using the xerces-c library, or potentially, to the execution of arbitrary code. For the oldstable distribution (wheezy), this problem has been fixed in version 3.1.1-3+deb7u2. For the stable distribution (jessie), this problem has been fixed in version 3.1.1-5.1+deb8u1. We recommend that you upgrade your xerces-c packages.

Debian Security Advisory

DSA-3493-1 xerces-c -- security update

Date Reported:
25 Feb 2016
Affected Packages:
xerces-c
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 815907.
In Mitre's CVE dictionary: CVE-2016-0729.
More information:

Gustavo Grieco discovered that xerces-c, a validating XML parser library for C++, mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting. These flaws could lead to a denial of service in applications using the xerces-c library, or potentially, to the execution of arbitrary code.

For the oldstable distribution (wheezy), this problem has been fixed in version 3.1.1-3+deb7u2.

For the stable distribution (jessie), this problem has been fixed in version 3.1.1-5.1+deb8u1.

We recommend that you upgrade your xerces-c packages.