Mageia 2020-0296: xerces-c security update
Summary
A use-after-free vulnerability was found in xerces-c in the way an XML
document is processed via the SAX API. Applications that process XML
documents with an external Document Type Definition (DTD) may be
vulnerable to this flaw. A remote attacker could exploit this flaw by
creating a specially crafted XML file that would crash the application or
potentially lead to arbitrary code execution (CVE-2018-1311).
References
- https://bugs.mageia.org/show_bug.cgi?id=26311
- https://access.redhat.com/errata/RHSA-2020:0704
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311
Resolution
MGASA-2020-0296 - Updated xerces-c packages fix security vulnerability
SRPMS
- 7/core/xerces-c-3.2.2-2.1.mga7