Debian: DSA-1984-1: New libxerces2-java packages fix denial of service

    Date30 Jan 2010
    CategoryDebian
    51
    Posted ByLinuxSecurity Advisories
    It was discovered that libxerces2-java, a validating XML parser for Java, does not properly process malformed XML files. This vulnerability could allow an attacker to cause a denial of service while parsing
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1984-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                        Giuseppe Iuculano
    January 30, 2010                      http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Packages       : libxerces2-java
    Vulnerability  : denial of service
    Problem type   : remote
    Debian-specific: no
    CVE Id         : CVE-2009-2625
    Debian Bug     : 548358
    
    
    It was discovered that libxerces2-java, a validating XML parser for Java,
    does not properly process malformed XML files.
    This vulnerability could allow an attacker to cause a denial of service while parsing
    a malformed XML file.
    
    For the oldstable distribution (etch), this problem has been fixed in
    version 2.8.1-1+etch1.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 2.9.1-2+lenny1.
    
    For the unstable distribution (sid), this problem has been fixed in
    version 2.9.1-4.1, and will migrate to the testing distribution (squeeze)
    shortly.
    
    
    We recommend that you upgrade your libxerces2-java package.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian (oldstable)
    - ------------------
    
    Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.dsc
        Size/MD5 checksum:      908 755507a0cfcb7e2c83bb5c4a048295ec
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1.orig.tar.gz
        Size/MD5 checksum:  1691101 737df086ccae96f77334974617ccb4e0
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1.diff.gz
        Size/MD5 checksum:     9951 a28511449d840005ba690a19bb6898f0
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.8.1-1+etch1_all.deb
        Size/MD5 checksum:  1109884 51c1bee829550381fccc419ae13d788e
    
    Debian (stable)
    - ---------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1.orig.tar.gz
        Size/MD5 checksum:  1711507 e340cba4a2abf4f0f833488380821153
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.dsc
        Size/MD5 checksum:     1564 687af8f7589c187b3eb845d56a212e8a
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1.diff.gz
        Size/MD5 checksum:    10682 d670183e18c295c02409a4fdefaebce5
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java_2.9.1-2+lenny1_all.deb
        Size/MD5 checksum:  1127062 597c68ab6819ef03af42d61134923d59
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-doc_2.9.1-2+lenny1_all.deb
        Size/MD5 checksum:  2088698 44509a477751e947333653be05b5ad96
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_amd64.deb
        Size/MD5 checksum:  2029670 9b7e6a7e146f4ed04c8543853eb99e5a
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_armel.deb
        Size/MD5 checksum:  1646348 d74607c34a3f04fc42d2407e742374a6
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_i386.deb
        Size/MD5 checksum:  1552678 a41c909d90a8c374099743cbcb8fc322
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_ia64.deb
        Size/MD5 checksum:  2789384 c33ee0865cafb66ba5c95c8696a60ca6
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mips.deb
        Size/MD5 checksum:  1783546 979c22e7c27eab584bf663bda7c99701
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_mipsel.deb
        Size/MD5 checksum:  1642400 b0a93dc38aa92787f9ab86c8641c66db
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_powerpc.deb
        Size/MD5 checksum:  1863554 14554d5098e58ab6b00a382b6bd35dd2
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_s390.deb
        Size/MD5 checksum:  2053338 66d637d7868f8080ae6dbc2b62b37c05
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/libx/libxerces2-java/libxerces2-java-gcj_2.9.1-2+lenny1_sparc.deb
        Size/MD5 checksum:  1754172 8aec4eb9bab4bf6770498c70be6347f3
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.