Bug#560940: marked as done (CVE-2009-3560 and CVE-2009-3720 denial-of-services)
Your message dated Sun, 10 Jan 2010 05:17:14 +0000
with message-id <E1NTqAs-000607-JQ@ries.debian.org>
and subject line Bug#560940: fixed in tla 1.3.5+dfsg-15
has caused the Debian Bug report #560940,
regarding CVE-2009-3560 and CVE-2009-3720 denial-of-services
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact email@example.com
Debian Bug Tracking System
Contact firstname.lastname@example.org with problems
--- Begin Message ---
The following CVE (Common Vulnerabilities & Exposures) ids were
published for expat. I have determined that this package embeds a
vulnerable copy of xmlparse.c and xmltok_impl.c. However, since this is
a mass bug filing (due to so many packages embedding expat), I have
not had time to determine whether the vulnerable code is actually
present in any of the binary packages derived from this source package.
Please determine whether this is the case. If the binary packages are
not affected, please feel free to close the bug with a message
containing the details of what you did to check.
| The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1,
| as used in the XML-Twig module for Perl, allows context-dependent
| attackers to cause a denial of service (application crash) via an XML
| document with malformed UTF-8 sequences that trigger a buffer
| over-read, related to the doProlog function in lib/xmlparse.c, a
| different vulnerability than CVE-2009-2625 and CVE-2009-3720.
| The updatePosition function in lib/xmltok_impl.c in libexpat in Expat
| 2.0.1, as used in Python, PyXML, w3c-libwww, and other software,
| allows context-dependent attackers to cause a denial of service
| (application crash) via an XML document with crafted UTF-8 sequences
| that trigger a buffer over-read, a different vulnerability than
These issues also affect old versions of expat, so this package in etch
and lenny is very likely affected. This is a low-severity security
issue, so DSAs will not be issued to correct these problems. However,
you can optionally submit a proposed-update to the release team for
inclusion in the next stable point releases. If you plan to do this,
please open new bugs and include the security tag so we are aware that
you are working on that.
For further information see ,,,. In particular,  and 
are links to the patches for CVE-2009-3560 and CVE-2009-3720
respectively. Note that the ideal solution would be to make use of the
system expat so only one package will need to be updated for future
security issues. Preferably in your update to unstable, alter your
package to make use of the system expat.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
--- End Message ---
--- Begin Message ---
We believe that the bug you reported is fixed in the latest version of
tla, which is due to be installed in the Debian FTP archive:
A summary of the changes between this version and the previous one is
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to email@example.com,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
Sylvain Beucler <firstname.lastname@example.org> (supplier of updated tla package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing email@example.com)
-----BEGIN PGP SIGNED MESSAGE-----
Date: Mon, 14 Dec 2009 17:27:55 +0100
Binary: tla tla-doc
Architecture: source all i386
Maintainer: Debian QA Group <firstname.lastname@example.org>
Changed-By: Sylvain Beucler <email@example.com>
tla - GNU Arch revision control system
tla-doc - GNU Arch revision control system (documentation)
tla (1.3.5+dfsg-15) unstable; urgency=low
* QA upload.
* Use system libexpat instead of bundled one (closes: #560940).
6833f0f593dfdcfefbd11fe1f4e865fad5197296 1647 tla_1.3.5+dfsg-15.dsc
99fca620f480935297b0adfe962990d9252ee427 33359 tla_1.3.5+dfsg-15.diff.gz
0e696755b39966f0869a6caa0e90db02e5ac910c 50462 tla-doc_1.3.5+dfsg-15_all.deb
be389e59b732b80a150f71292f13991a837e81bc 348136 tla_1.3.5+dfsg-15_i386.deb
b1a45d3e9f68ff1078f237ee102249f253f5b3c6abf14fc4cfa19e7860d21539 1647 tla_1.3.5+dfsg-15.dsc
544415b17f25823fd113152e8867b0a794ecd2fa2ebd595d8dceb0e675de67a0 33359 tla_1.3.5+dfsg-15.diff.gz
39f08a96422e55d98966b8e9824585c535d30502d858053c1eb8a5b52d207a06 50462 tla-doc_1.3.5+dfsg-15_all.deb
2c093cd62dd36ca73b6d4cfd2d26f42de6bc71aa1c3148fbe4fbae961486a295 348136 tla_1.3.5+dfsg-15_i386.deb
7206016e241c16d8ca931493638c4b78 1647 devel optional tla_1.3.5+dfsg-15.dsc
b57bb44c2be1ff6d59c8553e6ac91bb2 33359 devel optional tla_1.3.5+dfsg-15.diff.gz
4f2eb8e07faa93b59da5d63548ed2eef 50462 doc optional tla-doc_1.3.5+dfsg-15_all.deb
76a5950836ec9f192cd1464b598f9af6 348136 devel optional tla_1.3.5+dfsg-15_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
-----END PGP SIGNATURE-----
--- End Message ---