Fedora 29: xerces-c27 Security Update

    Date12 Feb 2019
    CategoryFedora
    108
    Posted ByLinuxSecurity Advisories
    Fixes for CVE-2016-4463 and CVE-2017-12627.
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2018-51ce232320
    2019-02-13 02:45:39.817303
    --------------------------------------------------------------------------------
    
    Name        : xerces-c27
    Product     : Fedora 29
    Version     : 2.7.0
    Release     : 28.fc29
    URL         : http://xml.apache.org/xerces-c/
    Summary     : Validating XML Parser
    Description :
    Xerces-C is a validating XML parser written in a portable subset of C++.
    Xerces-C makes it easy to give your application the ability to read and write
    XML data. A shared library is provided for parsing, generating, manipulating,
    and validating XML documents. Xerces-C is faithful to the XML 1.0
    recommendation and associated standards ( DOM 1.0, DOM 2.0. SAX 1.0, SAX 2.0,
    Namespaces).
    
    Note that this package contains Xerces-C++ 2.7.0 for compatibility with
    applications that cannot use a newer version.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Fixes for CVE-2016-4463 and CVE-2017-12627.
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Wed Aug  8 2018 Xavier Bachelot  - 2.7.0-28
    - Clean up spec.
    - Add patch for CVE-2016-4463 (RHBZ#1351469).
    - Add patch for CVE-2017-12627 (RHBZ#1551526).
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1551526 - CVE-2017-12627 xerces-c27: xerces-c: Null pointer dereference while processing the path to DTD allows denial of service [fedora-all]
            https://bugzilla.redhat.com/show_bug.cgi?id=1551526
      [ 2 ] Bug #1351469 - CVE-2016-4463 xerces-c27: xerces-c: Stack overflow when parsing deeply nested DTD [fedora-all]
            https://bugzilla.redhat.com/show_bug.cgi?id=1351469
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2018-51ce232320' at the command
    line. For more information, refer to the dnf documentation available at
    http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.