- -------------------------------------------------------------------------
Debian Security Advisory DSA-3321-2                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
August 08, 2015                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : opensaml2
CVE ID         : CVE-2015-0851
Debian Bug     : 794851

It was discovered that opensaml2, a Security Assertion Markup Language
library, needed to be rebuilt against a fixed version of the xmltooling
package due to its use of macros vulnerable to CVE-2015-0851 as fixed in
the DSA 3321-1 update. For reference the original advisory text follows.

The InCommon Shibboleth Training team discovered that XMLTooling, a
C++ XML parsing library, did not properly handle an exception when
parsing well-formed but schema-invalid XML. This could allow remote
attackers to cause a denial of service (crash) via crafted XML data.

For the oldstable distribution (wheezy), this problem has been fixed
in version 2.4.3-4+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 2.5.3-2+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version $stretch_VERSION.

For the unstable distribution (sid), this problem has been fixed in
version $UNSTABLE_VERSION.

We recommend that you upgrade your opensaml2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3321-2: opensaml2 security update

August 8, 2015
It was discovered that opensaml2, a Security Assertion Markup Language library, needed to be rebuilt against a fixed version of the xmltooling package due to its use of macros vuln...

Summary

The InCommon Shibboleth Training team discovered that XMLTooling, a
C++ XML parsing library, did not properly handle an exception when
parsing well-formed but schema-invalid XML. This could allow remote
attackers to cause a denial of service (crash) via crafted XML data.

For the oldstable distribution (wheezy), this problem has been fixed
in version 2.4.3-4+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 2.5.3-2+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version $stretch_VERSION.

For the unstable distribution (sid), this problem has been fixed in
version $UNSTABLE_VERSION.

We recommend that you upgrade your opensaml2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
It was discovered that opensaml2, a Security Assertion Markup Language
library, needed to be rebuilt against a fixed version of the xmltooling
package due to its use of macros vulnerable to CVE-2015-0851 as fixed in
the DSA 3321-1 update. For reference the original advisory text follows.

Related News