MGASA-2016-0385

Source
https://advisories.mageia.org/MGASA-2016-0385.html
Import Source
https://advisories.mageia.org/MGASA-2016-0385.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0385
Related
Published
2016-11-17T23:40:52Z
Modified
2026-02-04T02:35:01.703978Z
Summary
Updated derby packages fix security vulnerability
Details

Apache Derby could allow a remote attacker to obtain sensitive information, caused by a XML external entity (XXE) error when processing XML data by the XML datatype and XmlVTI. An attacker could exploit this vulnerability to read arbitrary files on the system or cause a denial of service (CVE-2015-1832).

References
Credits

Affected packages

Mageia:5 / derby

Package

Name
derby
Purl
pkg:rpm/mageia/derby?arch=source&distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.10.2.0-1.1.mga5

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2016-0385.json"