Russ Allbery uploaded new packages for xml-security-c which fixed the following security problems: CVE-2009-0217 (CERT VU#466161) It was discovered that the W3C XML Signature recommendation contains a protocol-level vulnerability related to HMAC output truncation. This update implements the proposed workaround in the C++ version of the Apache implementation of this standard, xml-security-c, by preventing truncation to output strings shorter than 80 bits or half of the original HMAC output, whichever is greater. For the etch-backports distribution the problems have been fixed in version 1.4.0-4~bpo40+1. The binary packages are libxml-security-c14 and libxml-security-c-dev. For the squeeze and sid distributions the problems have been fixed in version 1.4.0-4. Upgrade instructions -------------------- If you don't use pinning (see [1]) you have to update the packages manually via "apt-get -t etch-backports install <packagelist>" with the packagelist of your installed packages affected by this update. [1] <http://backports.org/dokuwiki/doku.php?id=instructions> We recommend to pin the backports repository to 200 so that new versions of installed backports will be installed automatically: Package: * Pin: release a=etch-backports Pin-Priority: 200
Attachment:
signature.asc
Description: Digital signature