ALT-PU-2024-8078-4
Package libxerces-c updated to version 3.2.5-alt1 for branch p10 in task 348166.
Closed vulnerabilities
BDU:2021-03489
Уязвимость библиотеки для работы с XML Xerces-C, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2023-06960
Уязвимость библиотеки Хerces C++ платформы совместного управления ИТ-оборудованием BigFix Platform, позволяющая нарушителю выполнить произвольный код
BDU:2024-01559
Уязвимость библиотеки синтаксического анализа XML Apache Xerces, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-1311
The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- RHSA-2020:0702
- RHSA-2020:0702
- RHSA-2020:0704
- RHSA-2020:0704
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- FEDORA-2023-52ba628e03
- FEDORA-2023-52ba628e03
- FEDORA-2023-817ecc703f
- FEDORA-2023-817ecc703f
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- DSA-4814
- DSA-4814
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2023-37536
An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote attackers to cause out-of-bound access via HTTP request.
- https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00027.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A6WWL4SWKAVYK6VK5YN7KZP4MZWC7IY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AJYZUBGPVWJ7LEHRCMB5XVADQBNGURXD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAOSSJ72CUJ535VRWTCVQKUYT2LYR3OM/
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107791
Modified: 2025-01-16
CVE-2024-23807
The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.