|
Message-ID: <0231daba-e200-b058-6857-e931284544ad@apache.org> Date: Fri, 16 Feb 2024 15:01:16 +0000 From: Arnout Engelen <engelen@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan Severity: moderate Affected versions: - Apache Xerces C++ 3.0.0 before 3.2.5 Description: The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4. This issue is being tracked as XERCESC-2188 References: https://github.com/apache/xerces-c/pull/54 https://xerces.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-23807 https://issues.apache.org/jira/browse/XERCESC-2188
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.