The Xerces-C XML parser mishandles certain kinds of malformed input documents, resulting in buffer overlows during processing and error reporting. The overflows can manifest as a segmentation fault or as memory corruption during a parse operation. The bugs allow for a denial of service attack in many applications by an unauthenticated attacker, and could conceivably result in remote code execution. External references: http://xerces.apache.org/xerces-c/secadv/CVE-2016-0729.txt Upstream patch: http://svn.apache.org/viewvc?view=revision&revision=1727978
Created mingw-xerces-c tracking bugs for this issue: Affects: fedora-all [bug 1312233]
Created xerces-c tracking bugs for this issue: Affects: fedora-all [bug 1312232] Affects: epel-6 [bug 1312234]
*** Bug 1296051 has been marked as a duplicate of this bug. ***
*** Bug 1296042 has been marked as a duplicate of this bug. ***
Acknowledgments: Name: Gustavo Grieco
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:0430 https://rhn.redhat.com/errata/RHSA-2016-0430.html
xerces-c-3.1.3-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
xerces-c-3.1.3-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
xerces-c-3.1.3-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
mingw-xerces-c-3.1.4-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
mingw-xerces-c-3.1.4-1.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
mingw-xerces-c-3.1.4-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.