-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1984-1                  security@debian.org
http://www.debian.org/security/                        Giuseppe Iuculano
January 30, 2010                      http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Packages       : libxerces2-java
Vulnerability  : denial of service
Problem type   : remote
Debian-specific: no
CVE Id         : CVE-2009-2625
Debian Bug     : 548358


It was discovered that libxerces2-java, a validating XML parser for Java,
does not properly process malformed XML files.
This vulnerability could allow an attacker to cause a denial of service while parsing
a malformed XML file.

For the oldstable distribution (etch), this problem has been fixed in
version 2.8.1-1+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 2.9.1-2+lenny1.

For the unstable distribution (sid), this problem has been fixed in
version 2.9.1-4.1, and will migrate to the testing distribution (squeeze)
shortly.


We recommend that you upgrade your libxerces2-java package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:      908 755507a0cfcb7e2c83bb5c4a048295ec
      Size/MD5 checksum:  1691101 737df086ccae96f77334974617ccb4e0
      Size/MD5 checksum:     9951 a28511449d840005ba690a19bb6898f0

Architecture independent packages:

      Size/MD5 checksum:  1109884 51c1bee829550381fccc419ae13d788e

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:  1711507 e340cba4a2abf4f0f833488380821153
      Size/MD5 checksum:     1564 687af8f7589c187b3eb845d56a212e8a
      Size/MD5 checksum:    10682 d670183e18c295c02409a4fdefaebce5

Architecture independent packages:

      Size/MD5 checksum:  1127062 597c68ab6819ef03af42d61134923d59
      Size/MD5 checksum:  2088698 44509a477751e947333653be05b5ad96

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:  2029670 9b7e6a7e146f4ed04c8543853eb99e5a

armel architecture (ARM EABI)

      Size/MD5 checksum:  1646348 d74607c34a3f04fc42d2407e742374a6

i386 architecture (Intel ia32)

      Size/MD5 checksum:  1552678 a41c909d90a8c374099743cbcb8fc322

ia64 architecture (Intel ia64)

      Size/MD5 checksum:  2789384 c33ee0865cafb66ba5c95c8696a60ca6

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:  1783546 979c22e7c27eab584bf663bda7c99701

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:  1642400 b0a93dc38aa92787f9ab86c8641c66db

powerpc architecture (PowerPC)

      Size/MD5 checksum:  1863554 14554d5098e58ab6b00a382b6bd35dd2

s390 architecture (IBM S/390)

      Size/MD5 checksum:  2053338 66d637d7868f8080ae6dbc2b62b37c05

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:  1754172 8aec4eb9bab4bf6770498c70be6347f3


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and http://packages.debian.org/

Debian: DSA-1984-1: New libxerces2-java packages fix denial of service

January 30, 2010
It was discovered that libxerces2-java, a validating XML parser for Java, does not properly process malformed XML files

Summary


It was discovered that libxerces2-java, a validating XML parser for Java,
does not properly process malformed XML files.
This vulnerability could allow an attacker to cause a denial of service while parsing
a malformed XML file.

For the oldstable distribution (etch), this problem has been fixed in
version 2.8.1-1+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 2.9.1-2+lenny1.

For the unstable distribution (sid), this problem has been fixed in
version 2.9.1-4.1, and will migrate to the testing distribution (squeeze)
shortly.


We recommend that you upgrade your libxerces2-java package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (oldstable)
- ------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 908 755507a0cfcb7e2c83bb5c4a048295ec
Size/MD5 checksum: 1691101 737df086ccae96f77334974617ccb4e0
Size/MD5 checksum: 9951 a28511449d840005ba690a19bb6898f0

Architecture independent packages:

Size/MD5 checksum: 1109884 51c1bee829550381fccc419ae13d788e

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

Size/MD5 checksum: 1711507 e340cba4a2abf4f0f833488380821153
Size/MD5 checksum: 1564 687af8f7589c187b3eb845d56a212e8a
Size/MD5 checksum: 10682 d670183e18c295c02409a4fdefaebce5

Architecture independent packages:

Size/MD5 checksum: 1127062 597c68ab6819ef03af42d61134923d59
Size/MD5 checksum: 2088698 44509a477751e947333653be05b5ad96

amd64 architecture (AMD x86_64 (AMD64))

Size/MD5 checksum: 2029670 9b7e6a7e146f4ed04c8543853eb99e5a

armel architecture (ARM EABI)

Size/MD5 checksum: 1646348 d74607c34a3f04fc42d2407e742374a6

i386 architecture (Intel ia32)

Size/MD5 checksum: 1552678 a41c909d90a8c374099743cbcb8fc322

ia64 architecture (Intel ia64)

Size/MD5 checksum: 2789384 c33ee0865cafb66ba5c95c8696a60ca6

mips architecture (MIPS (Big Endian))

Size/MD5 checksum: 1783546 979c22e7c27eab584bf663bda7c99701

mipsel architecture (MIPS (Little Endian))

Size/MD5 checksum: 1642400 b0a93dc38aa92787f9ab86c8641c66db

powerpc architecture (PowerPC)

Size/MD5 checksum: 1863554 14554d5098e58ab6b00a382b6bd35dd2

s390 architecture (IBM S/390)

Size/MD5 checksum: 2053338 66d637d7868f8080ae6dbc2b62b37c05

sparc architecture (Sun SPARC/UltraSPARC)

Size/MD5 checksum: 1754172 8aec4eb9bab4bf6770498c70be6347f3


These files will probably be moved into the stable distribution on
its next update.

For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main

Package info: `apt-cache show ' and http://packages.debian.org/

Severity

Related News