Updated xerces-c packages fix security vulnerabilityPublication date: 31 Jul 2020
Affected Mageia releases : 7
A use-after-free vulnerability was found in xerces-c in the way an XML document is processed via the SAX API. Applications that process XML documents with an external Document Type Definition (DTD) may be vulnerable to this flaw. A remote attacker could exploit this flaw by creating a specially crafted XML file that would crash the application or potentially lead to arbitrary code execution (CVE-2018-1311).