Debian 10260 Published by

An Opensaml2 security update has been released for Debian



- -------------------------------------------------------------------------
Debian Security Advisory DSA-3321-2 security@debian.org
https://www.debian.org/security/ Alessandro Ghedini
August 08, 2015 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : opensaml2
CVE ID : CVE-2015-0851
Debian Bug : 794851

It was discovered that opensaml2, a Security Assertion Markup Language
library, needed to be rebuilt against a fixed version of the xmltooling
package due to its use of macros vulnerable to CVE-2015-0851 as fixed in
the DSA 3321-1 update. For reference the original advisory text follows.

The InCommon Shibboleth Training team discovered that XMLTooling, a
C++ XML parsing library, did not properly handle an exception when
parsing well-formed but schema-invalid XML. This could allow remote
attackers to cause a denial of service (crash) via crafted XML data.

For the oldstable distribution (wheezy), this problem has been fixed
in version 2.4.3-4+deb7u1.

For the stable distribution (jessie), this problem has been fixed in
version 2.5.3-2+deb8u1.

For the testing distribution (stretch), this problem has been fixed
in version $stretch_VERSION.

For the unstable distribution (sid), this problem has been fixed in
version $UNSTABLE_VERSION.

We recommend that you upgrade your opensaml2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/