Security bug in XMLTooling-C before 1.6.3 [CVE-2018-0486]
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
xmltooling (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned | ||
Artful |
Triaged
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
From the Debian bug report at https:/
Philip Huppert discovered the Shibboleth service provider is vulnerable to impersonation attacks and information disclosure due to mishandling of DTDs in the XMLTooling XML parsing library. For additional details please refer to the upstream advisory at https:/
For the oldstable distribution (jessie), this problem has been fixed in version 1.5.3-2+deb8u2.
The stable distribution (stretch) is not affected.
We recommend that you upgrade your xmltooling packages.
For the detailed security status of xmltooling please refer to its security tracker page at: https:/
This bug is fixed upstream in Debian.
CVE References
information type: | Private Security → Public Security |
Changed in xmltooling (Ubuntu): | |
status: | Incomplete → Triaged |
Changed in xmltooling (Ubuntu Artful): | |
status: | New → Triaged |
Changed in xmltooling (Ubuntu Xenial): | |
status: | New → Triaged |
Changed in xmltooling (Ubuntu Trusty): | |
status: | New → Triaged |
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res