This is an automated email from the ASF dual-hosted git repository. borisk pushed a commit to branch xerces-3.1 in repository https://gitbox.apache.org/repos/asf/xerces-c.git
commit a9d0b8da03902d9a5f3165ab842edfeb1a51b69c Author: Scott Cantor <scan...@apache.org> AuthorDate: Wed Jun 29 14:14:59 2016 +0000 Add advisory to site git-svn-id: https://svn.apache.org/repos/asf/xerces/c/branches/xerces-3.1@1750649 13f79535-47bb-0310-9956-ffa450edef68 --- doc/html/secadv/CVE-2016-4463.txt | 58 +++++++++++++++++++++++++++++++++++++++ doc/secadv.xml | 8 ++++++ 2 files changed, 66 insertions(+) diff --git a/doc/html/secadv/CVE-2016-4463.txt b/doc/html/secadv/CVE-2016-4463.txt new file mode 100644 index 0000000..8b62e76 --- /dev/null +++ b/doc/html/secadv/CVE-2016-4463.txt @@ -0,0 +1,58 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + + +CVE-2016-4463: Apache Xerces-C XML Parser Crashes on Malformed DTD + +Severity: Important + +Vendor: The Apache Software Foundation + +Versions Affected: Apache Xerces-C XML Parser library versions +prior to V3.1.4 + +Description: The Xerces-C XML parser fails to successfully parse a +DTD that is deeply nested, and this causes a stack overflow, which +makes a denial of service attack against many applications possible +by an unauthenticated attacker. + +Mitigation: Applications that are using library versions older than +V3.1.4 should upgrade as soon as possible. Distributors of older +versions should apply the patches from this subversion revision: + +http://svn.apache.org/viewvc?view=revision&revision=1747619 + +Note that the nesting limit is currently implemented as a compile-time +constant in order to maintain ABI-compatibility. + +In addition, a related enhancement was made to enable applications +to fully disable DTD processing through the use of an environment +variable. Distributors of older versions are urged to incorporate +this patch to enable applications to more fully protect themselves +from future issues if they do not require DTD support. This change +is ABI-compatible and can be found in this subversion revision: + +http://svn.apache.org/viewvc?view=revision&revision=1747620 + +Credit: This issue was reported by Brandon Perry. + +References: +http://xerces.apache.org/xerces-c/secadv/CVE-2016-4463.txt + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2 + +iQIcBAEBCAAGBQJXXqPQAAoJEDeLhFQCJ3liyRwQAI5aUjhKtZtw+51EgNizpuLa +dvfEP27anUXLKwLXt+WIfogW3TLQ4HwyiszanO4YTlwz3qbKO3TJQXdT4kTQx6/k +KhWr7+vsn7pBEPiiC7kj3lH7QHCd+T8/W+Xik/rKDFV1qAAKuoFgYJ31qED8I65z +371Tdm+p2QE4Nh9M7k7LUs+yWu5XdwJIS61L3R/MpEptynuo7Onbp+sjF6OQCZHc +u1KJ3zAlKzP4iwtxKjvoXqOnLgYwjtqC2p7nYBEXOEn4DA4Q/PMrfdYIebjUo/Wy +CeIN5TGJ2aunMkVK0RgxCqjr0sl2cYqY8iegUqp9Iz4+rMpy5ZDLNyyjgbXgSY73 +8145xO2tscLs7bLXAXUGbLlOPxnDqVieGlYyHICFnl58I4ekfhwtMmd9d2WOlaVE +7NEPTorFiHI+wdK2yebCLAMaJbL9KJQiJa/4xw9qvpZ4DQ7aein9jq7fklQ62crc +Ff4h4icX4icM1/s1tvcEM1lZw8Td4UyXkwvoEmfZg7dVy4NW+XM/Kn4FUCPRnC9A +XVAabL3K290Mz77YLqUTk733w1q/lFCxgOCJF18/OJef2azMn74QgFbLcBD16i2O +FNxdtPsSRGNsfOGN08Uiwg9RN6uqoZ6Rxwq3hEcAiufYQHFiXldlS26koP2QMk03 +gNuHTr22AcR0ZgoW9GYP +=eilz +-----END PGP SIGNATURE----- diff --git a/doc/secadv.xml b/doc/secadv.xml index 44d6b56..9494f46 100644 --- a/doc/secadv.xml +++ b/doc/secadv.xml @@ -20,6 +20,14 @@ <s1 title="Security Advisories"> +<s2 title="Addressed in 3.1.4 and Later Releases"> +<p>The following security advisories apply to versions of +Xerces-C older than V3.1.4:</p> +<ul> + <li><jump href="secadv/CVE-2016-4463.txt">CVE-2016-4463: Apache Xerces-C XML Parser Crashes on Malformed DTD</jump></li> +</ul> +</s2> + <s2 title="Addressed in 3.1.3 and Later Releases"> <p>The following security advisories apply to versions of Xerces-C older than V3.1.3:</p> --------------------------------------------------------------------- To unsubscribe, e-mail: c-dev-unsubscr...@xerces.apache.org For additional commands, e-mail: c-dev-h...@xerces.apache.org