MGASA-2020-0296 - Updated xerces-c packages fix security vulnerability

Publication date: 31 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0296.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2018-1311

A use-after-free vulnerability was found in xerces-c in the way an XML
document is processed via the SAX API. Applications that process XML
documents with an external Document Type Definition (DTD) may be
vulnerable to this flaw. A remote attacker could exploit this flaw by
creating a specially crafted XML file that would crash the application or
potentially lead to arbitrary code execution (CVE-2018-1311).

References:
- https://bugs.mageia.org/show_bug.cgi?id=26311
- https://access.redhat.com/errata/RHSA-2020:0704
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311

SRPMS:
- 7/core/xerces-c-3.2.2-2.1.mga7

Mageia 2020-0296: xerces-c security update

A use-after-free vulnerability was found in xerces-c in the way an XML document is processed via the SAX API

Summary

A use-after-free vulnerability was found in xerces-c in the way an XML document is processed via the SAX API. Applications that process XML documents with an external Document Type Definition (DTD) may be vulnerable to this flaw. A remote attacker could exploit this flaw by creating a specially crafted XML file that would crash the application or potentially lead to arbitrary code execution (CVE-2018-1311).

References

- https://bugs.mageia.org/show_bug.cgi?id=26311

- https://access.redhat.com/errata/RHSA-2020:0704

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311

Resolution

MGASA-2020-0296 - Updated xerces-c packages fix security vulnerability

SRPMS

- 7/core/xerces-c-3.2.2-2.1.mga7

Severity
Publication date: 31 Jul 2020
URL: https://advisories.mageia.org/MGASA-2020-0296.html
Type: security
CVE: CVE-2018-1311

Related News