-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1433
                           expat security update
                                8 June 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           expat
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-5300 CVE-2012-6702 

Reference:         ESB-2012.0742
                   ESB-2012.0552

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3597

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3597-1                   security@debian.org
https://www.debian.org/security/                            Luciano Bello
June 07, 2016                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : expat
CVE ID         : CVE-2012-6702 CVE-2016-5300

Two related issues have been discovered in Expat, a C library for parsing
XML.

CVE-2012-6702

    It was introduced when CVE-2012-0876 was addressed. Stefan Sørensen
    discovered that the use of the function XML_Parse() seeds the random
    number generator generating repeated outputs for rand() calls.

CVE-2016-5300

      It is the product of an incomplete solution for CVE-2012-0876. The
      parser poorly seeds the random number generator allowing an
      attacker to cause a denial of service (CPU consumption) via an XML
      file with crafted identifiers.

You might need to manually restart programs and services using expat
libraries.

For the stable distribution (jessie), these problems have been fixed in
version 2.1.0-6+deb8u3.

For the unstable distribution (sid), these problems have been fixed in
version 2.1.1-3.

We recommend that you upgrade your expat packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Au1C
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=INVx
-----END PGP SIGNATURE-----