Bug 39422 - expat: Mehrere Sicherheitslücken (ES 3.2)
expat: Mehrere Sicherheitslücken (ES 3.2)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P4 normal (vote)
: UCS 3.2-x-errata
Assigned To: UCS maintainers
:
Depends on: 42570
Blocks:
  Show dependency treegraph
 
Reported: 2015-09-28 18:17 CEST by Arvid Requate
Modified: 2019-04-11 19:23 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 6.8 (N/AC:M/Au:N/C:P/I:P/A:P)
requate: Patch_Available+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2015-09-28 18:17:10 CEST
This security issue is fixed in upstream Debian package version 2.0.1-7+squeeze2:

* Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0 allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data (CVE-2015-1283)

+++ This bug was initially created as a clone of Bug #39421 +++
Comment 1 Arvid Requate univentionstaff 2016-06-07 20:14:54 CEST
Two additional issues have been fixed in the Jessie package version:

* unanticipated internal calls to srand (CVE-2012-6702)
* use of too little entropy (CVE-2016-5300)
Comment 2 Stefan Gohmann univentionstaff 2017-06-16 20:36:29 CEST
This issue has been filed against UCS 3. UCS 3 is out of the normal maintenance and many UCS components have vastly changed in UCS 4.

If this issue is still valid, please change the version to a newer UCS version otherwise this issue will be automatically closed in the next weeks.