ALT-PU-2016-1794-1
Package libxerces-c updated to version 3.1.4-alt1 for branch sisyphus in task 167879.
Closed vulnerabilities
Published: 2016-07-19
Modified: 2021-03-23
Modified: 2021-03-23
BDU:2016-01690
Уязвимость библиотеки Xerces C++, позволяющая нарушителю вызвать отказ в обслуживании
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
References:
Published: 2016-05-13
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-2099
Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
Severity: CRITICAL (10.0)
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
- http://www.debian.org/security/2016/dsa-3579
- http://www.openwall.com/lists/oss-security/2016/05/09/7
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/90502
- https://issues.apache.org/jira/browse/XERCESC-2066
- https://security.gentoo.org/glsa/201612-46
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00016.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
- http://www.debian.org/security/2016/dsa-3579
- http://www.openwall.com/lists/oss-security/2016/05/09/7
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/90502
- https://issues.apache.org/jira/browse/XERCESC-2066
- https://security.gentoo.org/glsa/201612-46
Published: 2016-07-08
Modified: 2025-04-12
Modified: 2025-04-12
CVE-2016-4463
Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
- http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/archive/1/538784/100/0/threaded
- http://www.securityfocus.com/bid/91501
- http://www.securitytracker.com/id/1036211
- http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
- https://access.redhat.com/errata/RHSA-2018:3335
- https://access.redhat.com/errata/RHSA-2018:3506
- https://access.redhat.com/errata/RHSA-2018:3514
- https://issues.apache.org/jira/browse/XERCESC-2069
- https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069
- https://www.debian.org/security/2016/dsa-3610
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00013.html
- http://packetstormsecurity.com/files/137714/Apache-Xerces-C-XML-Parser-Crash.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/archive/1/538784/100/0/threaded
- http://www.securityfocus.com/bid/91501
- http://www.securitytracker.com/id/1036211
- http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt
- https://access.redhat.com/errata/RHSA-2018:3335
- https://access.redhat.com/errata/RHSA-2018:3506
- https://access.redhat.com/errata/RHSA-2018:3514
- https://issues.apache.org/jira/browse/XERCESC-2069
- https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=10510&version=12336069
- https://www.debian.org/security/2016/dsa-3610
- https://www.oracle.com/security-alerts/cpuapr2020.html