Lucene search

K
debianDebianDEBIAN:5632FBD318D26EA8A80F3D207C2C37F3:9024E
HistoryAug 06, 2009 - 8:38 a.m.

[Backports-security-announce] Security Update for xml-security-c

2009-08-0608:38:10
lists.debian.org
19

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.973 High

EPSS

Percentile

99.8%

Russ Allbery uploaded new packages for xml-security-c which fixed the
following security problems:

CVE-2009-0217 (CERT VU#466161)

It was discovered that the W3C XML Signature recommendation contains a
protocol-level vulnerability related to HMAC output truncation. This
update implements the proposed workaround in the C++ version of the
Apache implementation of this standard, xml-security-c, by preventing
truncation to output strings shorter than 80 bits or half of the
original HMAC output, whichever is greater.

For the etch-backports distribution the problems have been fixed in
version 1.4.0-4~bpo40+1. The binary packages are libxml-security-c14 and
libxml-security-c-dev.

For the squeeze and sid distributions the problems have been fixed in
version 1.4.0-4.

Upgrade instructions

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions&gt;

We recommend to pin the backports repository to 200 so that new versions
of installed backports will be installed automatically:

Package: *
Pin: release a=etch-backports
Pin-Priority: 200

OSVersionArchitecturePackageVersionFilename
Debian6allxml-security-c< 1.4.0-4xml-security-c_1.4.0-4_all.deb

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.973 High

EPSS

Percentile

99.8%