|
|
Subscribe / Log in / New account

xerces-c: code execution

Package(s):xerces-c CVE #(s):CVE-2016-0729
Created:February 26, 2016 Updated:April 18, 2016
Description:

From the Debian-LTS advisory:

Gustavo Grieco discovered that xerces-c, a validating XML parser library for C++, mishandles certain kinds of malformed input documents, resulting in buffer overflows during processing and error reporting. These flaws could lead to a denial of service in applications using the xerces-c library, or potentially, to the execution of arbitrary code.

Alerts:
openSUSE openSUSE-SU-2016:1808-1 xerces-c 2016-07-15
Fedora FEDORA-2016-7615febbd6 mingw-xerces-c 2016-07-06
Fedora FEDORA-2016-87e8468465 mingw-xerces-c 2016-07-06
Fedora FEDORA-2016-0a061f6dd9 mingw-xerces-c 2016-07-05
Gentoo 201612-46 xerces-c 2016-12-24
openSUSE openSUSE-SU-2016:1121-1 xerces-c 2016-04-21
Fedora FEDORA-2016-880b91c090 xerces-c 2016-04-18
Fedora FEDORA-2016-ae9ac16cf3 xerces-c 2016-04-13
openSUSE openSUSE-SU-2016:0966-1 xerces-c 2016-04-07
CentOS CESA-2016:0430 xerces-c 2016-03-10
Oracle ELSA-2016-0430 xerces-c 2016-03-10
Scientific Linux SLSA-2016:0430-1 xerces-c 2016-03-10
Red Hat RHSA-2016:0430-01 xerces-c 2016-03-10
Mageia MGASA-2016-0088 xerces-c 2016-03-02
Debian DSA-3493-1 xerces-c 2016-02-25
Debian-LTS DLA-433-1 xerces-c 2016-02-25

to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds