Summary: | <dev-java/xerces-2.11.0: Codenomicon Malformed XML input DoS (CVE-2009-2625) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | java |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.cert.fi/en/reports/2009/vulnerability2009085.html | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
2009-08-06 22:45:08 UTC
Vendor Statements Python: We are working on a fix. nevermind the last comment, thx *xerces-2.11.0 (26 May 2012) 26 May 2012; Ralph Sennhauser <sera@gentoo.org> +xerces-2.11.0.ebuild, +files/xerces-2.11.0-build.xml.patch: Security bump. #280611 Don't let taskdef point to non-existent jar. #351394 Arches, please test and mark stable: =dev-java/xerces-2.11.0 Target keywords : "amd64 ppc ppc64 x86" The following keyword changes are necessary to proceed: =dev-java/xml-commons-external-1.4.01 amd64 ok amd64 stable x86 stable ppc64 done ppc stable, last arch done. Thanks, everyone. GLSA vote: no. GLSA Vote: no, too. Closing noglsa. |