[Bug 1600717] [NEW] Sync expat 2.2.0-1 (main) from Debian unstable (main)

LocutusOfBorg costamagnagianfranco at yahoo.it
Mon Jul 11 08:33:35 UTC 2016


Public bug reported:

Please sync expat 2.2.0-1 (main) from Debian unstable (main)

Explanation of the Ubuntu delta and why it can be dropped:
  * SECURITY UPDATE: unanticipated internal calls to srand
    - debian/patches/CVE-2012-6702-1.patch: remove srand, use more entropy
      in lib/xmlparse.c.
    - debian/patches/CVE-2012-6702-2.patch: use a prime that fits 32bits on
      32bit platforms in lib/xmlparse.c.
    - CVE-2012-6702
  * SECURITY UPDATE: use of too little entropy
    - debian/patches/CVE-2016-5300-1.patch: extract method
      gather_time_entropy in lib/xmlparse.c.
    - debian/patches/CVE-2016-5300-2.patch: extract entropy from XML_Parser
      address in lib/xmlparse.c.
    - CVE-2016-5300
  * SECURITY UPDATE: denial of service and possible code execution via
    malformed documents
    - debian/patches/CVE-2016-0718.patch: fix out of bounds memory access
      and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h,
      lib/xmltok_impl.c.
    - CVE-2016-0718
  * SECURITY UPDATE: integer overflows in XML_GetBuffer
    - debian/patches/CVE-2015-1283-refix.patch: improved existing fix in
      lib/xmlparse.c.
    - CVE-2015-1283

Everything is part of Debian and the new upstream release.

Changelog entries since current yakkety version 2.1.1-1ubuntu2:

expat (2.2.0-1) unstable; urgency=low

  * New upstream release, update symbols accordingly.
  * Use upstream manpage for xmlwf.
  * Drop all patches as this release contains those.

 -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Tue, 21 Jun 2016 15:29:58
+0000

expat (2.1.1-3) unstable; urgency=high

  * Use upstream fix for the following security vulnerabilities:
    - CVE-2012-6702, unanticipated internal calls to srand
    - CVE-2016-5300, use of too little entropy

 -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Sun, 05 Jun 2016 00:17:46
+0000

expat (2.1.1-2) unstable; urgency=high

  * Avoid relying on undefined behavior in CVE-2015-1283 fix.
  * Apply upstream patch to fix the root cause of CVE-2016-0718 and
    CVE-2016-0719 vulnerabilities.
  * Update Standards-Version to 3.9.8 .

 -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Mon, 16 May 2016 05:35:08
+0000

** Affects: expat (Ubuntu)
     Importance: Wishlist
         Status: New

** Changed in: expat (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to expat in Ubuntu.
https://bugs.launchpad.net/bugs/1600717

Title:
  Sync expat 2.2.0-1 (main) from Debian unstable (main)

Status in expat package in Ubuntu:
  New

Bug description:
  Please sync expat 2.2.0-1 (main) from Debian unstable (main)

  Explanation of the Ubuntu delta and why it can be dropped:
    * SECURITY UPDATE: unanticipated internal calls to srand
      - debian/patches/CVE-2012-6702-1.patch: remove srand, use more entropy
        in lib/xmlparse.c.
      - debian/patches/CVE-2012-6702-2.patch: use a prime that fits 32bits on
        32bit platforms in lib/xmlparse.c.
      - CVE-2012-6702
    * SECURITY UPDATE: use of too little entropy
      - debian/patches/CVE-2016-5300-1.patch: extract method
        gather_time_entropy in lib/xmlparse.c.
      - debian/patches/CVE-2016-5300-2.patch: extract entropy from XML_Parser
        address in lib/xmlparse.c.
      - CVE-2016-5300
    * SECURITY UPDATE: denial of service and possible code execution via
      malformed documents
      - debian/patches/CVE-2016-0718.patch: fix out of bounds memory access
        and integer overflow in lib/xmlparse.c, lib/xmltok.c, lib/xmltok.h,
        lib/xmltok_impl.c.
      - CVE-2016-0718
    * SECURITY UPDATE: integer overflows in XML_GetBuffer
      - debian/patches/CVE-2015-1283-refix.patch: improved existing fix in
        lib/xmlparse.c.
      - CVE-2015-1283

  Everything is part of Debian and the new upstream release.

  Changelog entries since current yakkety version 2.1.1-1ubuntu2:

  expat (2.2.0-1) unstable; urgency=low

    * New upstream release, update symbols accordingly.
    * Use upstream manpage for xmlwf.
    * Drop all patches as this release contains those.

   -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Tue, 21 Jun 2016
  15:29:58 +0000

  expat (2.1.1-3) unstable; urgency=high

    * Use upstream fix for the following security vulnerabilities:
      - CVE-2012-6702, unanticipated internal calls to srand
      - CVE-2016-5300, use of too little entropy

   -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Sun, 05 Jun 2016
  00:17:46 +0000

  expat (2.1.1-2) unstable; urgency=high

    * Avoid relying on undefined behavior in CVE-2015-1283 fix.
    * Apply upstream patch to fix the root cause of CVE-2016-0718 and
      CVE-2016-0719 vulnerabilities.
    * Update Standards-Version to 3.9.8 .

   -- Laszlo Boszormenyi (GCS) <gcs at debian.org>  Mon, 16 May 2016
  05:35:08 +0000

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/expat/+bug/1600717/+subscriptions



More information about the foundations-bugs mailing list