Bug 44859 - expat: Multiple issues (4.2)
expat: Multiple issues (4.2)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
Other Linux
: P5 normal (vote)
: UCS 4.2-3-errata
Assigned To: Philipp Hahn
Arvid Requate
Depends on:
Blocks: 43355
  Show dependency treegraph
Reported: 2017-06-26 15:27 CEST by Arvid Requate
Modified: 2018-05-08 14:56 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score: 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
requate: Patch_Available+


Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2017-06-26 15:27:18 CEST
Upstream Debian package version 2.1.0-6+deb8u4 fixes:

* Inifinite loop due to invalid XML in external entity (CVE-2017-9233)

* Denial of service due to integer overflow to fix inside XML_Parse (CVE-2016-9063)
Comment 1 Philipp Hahn univentionstaff 2018-01-25 10:59:57 CET
Mass-import from Debian-Security:
  python -m univention.repong.^Cbmirror -s jessie -r 4.2-3 --override=$HOME/REPOS/repo-ng/mirror/update_ucs42_mirror_from_debian.yml --errata=doc/errata --sql --process=ALL -vvvv --now=201801211553

YAML: git:bd6159834a..449aa5a7cf
Comment 2 Quality Assurance univentionstaff 2018-05-04 16:57:26 CEST
--- mirror/ftp/4.2/unmaintained/4.2-0/source/expat_2.1.0-6+deb8u3.dsc
+++ apt/ucs_4.2-0-errata4.2-3/source/expat_2.1.0-6+deb8u4.dsc
@@ -1,3 +1,9 @@
+2.1.0-6+deb8u4 [Sun, 18 Jun 2017 06:54:14 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
+  * Use upstream fix for the following vulnerabilities:
+    - CVE-2017-9233, external entity infinite loop bug,
+    - CVE-2016-9063, undefined behavior from signed integer overflow.
 2.1.0-6+deb8u3 [Sun, 05 Jun 2016 08:32:26 +0000] Laszlo Boszormenyi (GCS) <gcs@debian.org>:
   * Use upstream fix for the following security vulnerabilities:
Comment 3 Arvid Requate univentionstaff 2018-05-07 21:58:33 CEST
* No UCS specific patches
* Comparison to previously shipped version ok
* Installation Ok
* Advisory adjusted:
  7e7e6010a4 | Sort CVEs and adjust wording
Comment 4 Arvid Requate univentionstaff 2018-05-08 14:56:26 CEST