Security bug in XMLTooling-C before 1.6.4 [CVE-2018-0489]
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
xmltooling (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Emily Ratliff | ||
Artful |
Won't Fix
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
From the Debian security advisory at https:/
Kelby Ludwig and Scott Cantor discovered that the Shibboleth service provider is vulnerable to impersonation attacks and information disclosure due to incorrect XML parsing. For additional details please refer to the upstream advisory at https:/
For the oldstable distribution (jessie), this problem has been fixed in version 1.5.3-2+deb8u3.
For the stable distribution (stretch), this problem has been fixed in version 1.6.0-4+deb9u1.
We recommend that you upgrade your xmltooling packages.
For the detailed security status of xmltooling please refer to its security tracker page at: https:/
This bug is fixed upstream in Debian
information type: | Private Security → Public Security |
Changed in xmltooling (Ubuntu Xenial): | |
status: | Incomplete → In Progress |
assignee: | nobody → Emily Ratliff (emilyr) |
Status changed to 'Confirmed' because the bug affects multiple users.