====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: xerces-c security update
Advisory ID:       RHSA-2015:1193-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2015:1193.html
Issue date:        2015-06-29
CVE Names:         CVE-2015-0252 
====================================================================
1. Summary:

An updated xerces-c package that fixes one security issue is now available
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64

3. Description:

Xerces-C is a validating XML parser written in a portable subset of C++.

A flaw was found in the way the Xerces-C XML parser processed certain XML
documents. A remote attacker could provide specially crafted XML input
that, when parsed by an application using Xerces-C, would cause that
application to crash. (CVE-2015-0252)

All xerces-c users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1199103 - CVE-2015-0252 xerces-c: crashes on malformed input

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
xerces-c-3.1.1-7.el7_1.src.rpm

noarch:
xerces-c-doc-3.1.1-7.el7_1.noarch.rpm

x86_64:
xerces-c-3.1.1-7.el7_1.i686.rpm
xerces-c-3.1.1-7.el7_1.x86_64.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm
xerces-c-devel-3.1.1-7.el7_1.i686.rpm
xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
xerces-c-3.1.1-7.el7_1.src.rpm

ppc64:
xerces-c-3.1.1-7.el7_1.ppc.rpm
xerces-c-3.1.1-7.el7_1.ppc64.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm

s390x:
xerces-c-3.1.1-7.el7_1.s390.rpm
xerces-c-3.1.1-7.el7_1.s390x.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm

x86_64:
xerces-c-3.1.1-7.el7_1.i686.rpm
xerces-c-3.1.1-7.el7_1.x86_64.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
xerces-c-3.1.1-7.ael7b_1.src.rpm

ppc64le:
xerces-c-3.1.1-7.ael7b_1.ppc64le.rpm
xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch:
xerces-c-doc-3.1.1-7.el7_1.noarch.rpm

ppc64:
xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm
xerces-c-devel-3.1.1-7.el7_1.ppc.rpm
xerces-c-devel-3.1.1-7.el7_1.ppc64.rpm

s390x:
xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm
xerces-c-devel-3.1.1-7.el7_1.s390.rpm
xerces-c-devel-3.1.1-7.el7_1.s390x.rpm

x86_64:
xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm
xerces-c-devel-3.1.1-7.el7_1.i686.rpm
xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch:
xerces-c-doc-3.1.1-7.ael7b_1.noarch.rpm

ppc64le:
xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm
xerces-c-devel-3.1.1-7.ael7b_1.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
xerces-c-3.1.1-7.el7_1.src.rpm

x86_64:
xerces-c-3.1.1-7.el7_1.i686.rpm
xerces-c-3.1.1-7.el7_1.x86_64.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch:
xerces-c-doc-3.1.1-7.el7_1.noarch.rpm

x86_64:
xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm
xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm
xerces-c-devel-3.1.1-7.el7_1.i686.rpm
xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2015-0252
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2015 Red Hat, Inc.

Red Hat: 2015:1193-01: xerces-c: Moderate Advisory

An updated xerces-c package that fixes one security issue is now available for Red Hat Enterprise Linux 7

Summary

Xerces-C is a validating XML parser written in a portable subset of C++.
A flaw was found in the way the Xerces-C XML parser processed certain XML documents. A remote attacker could provide specially crafted XML input that, when parsed by an application using Xerces-C, would cause that application to crash. (CVE-2015-0252)
All xerces-c users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2015-0252 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux Client Optional (v. 7):
Source: xerces-c-3.1.1-7.el7_1.src.rpm
noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm
x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: xerces-c-3.1.1-7.el7_1.src.rpm
ppc64: xerces-c-3.1.1-7.el7_1.ppc.rpm xerces-c-3.1.1-7.el7_1.ppc64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm
s390x: xerces-c-3.1.1-7.el7_1.s390.rpm xerces-c-3.1.1-7.el7_1.s390x.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm
x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: xerces-c-3.1.1-7.ael7b_1.src.rpm
ppc64le: xerces-c-3.1.1-7.ael7b_1.ppc64le.rpm xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm
ppc64: xerces-c-debuginfo-3.1.1-7.el7_1.ppc.rpm xerces-c-debuginfo-3.1.1-7.el7_1.ppc64.rpm xerces-c-devel-3.1.1-7.el7_1.ppc.rpm xerces-c-devel-3.1.1-7.el7_1.ppc64.rpm
s390x: xerces-c-debuginfo-3.1.1-7.el7_1.s390.rpm xerces-c-debuginfo-3.1.1-7.el7_1.s390x.rpm xerces-c-devel-3.1.1-7.el7_1.s390.rpm xerces-c-devel-3.1.1-7.el7_1.s390x.rpm
x86_64: xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: xerces-c-doc-3.1.1-7.ael7b_1.noarch.rpm
ppc64le: xerces-c-debuginfo-3.1.1-7.ael7b_1.ppc64le.rpm xerces-c-devel-3.1.1-7.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: xerces-c-3.1.1-7.el7_1.src.rpm
x86_64: xerces-c-3.1.1-7.el7_1.i686.rpm xerces-c-3.1.1-7.el7_1.x86_64.rpm xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: xerces-c-doc-3.1.1-7.el7_1.noarch.rpm
x86_64: xerces-c-debuginfo-3.1.1-7.el7_1.i686.rpm xerces-c-debuginfo-3.1.1-7.el7_1.x86_64.rpm xerces-c-devel-3.1.1-7.el7_1.i686.rpm xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2015:1193-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2015:1193.html
Issued Date: : 2015-06-29
CVE Names: CVE-2015-0252

Topic

An updated xerces-c package that fixes one security issue is now availablefor Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having Moderate securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64

Red Hat Enterprise Linux Workstation (v. 7) - x86_64

Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64


Bugs Fixed

1199103 - CVE-2015-0252 xerces-c: crashes on malformed input


Related News