Package: release.debian.org
Severity: normal
Tags: wheezy
User: release.debian....@packages.debian.org
Usertags: pu

Hi,

As agreed with the security team, we’d like to address CVE-2014-2053 in
stable (oldstable being not affected) via pu instead of a proper DSA
because php-getid3 is a leaf package in stable and the vulnerability
likely hard to be exposed in practice.

php-getid3 1.9.7-2 fixed the issue in unstable.

Regards

David

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (500, 
'oldstable'), (100, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.14-trunk-amd64 (SMP w/1 CPU core)
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
diff --git a/debian/changelog b/debian/changelog
index 1c63cbd..0351463 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,10 @@
+php-getid3 (1.9.3-1+deb7u1) wheezy; urgency=medium
+
+  * Close potential XXE security issue [CVE-2014-2053]
+  * Add gbp config file
+
+ -- David Prévot <taf...@debian.org>  Tue, 15 Apr 2014 16:36:53 -0400
+
 php-getid3 (1.9.3-1) unstable; urgency=low
 
   * New upstream release (closes: #615946).
diff --git a/debian/gbp.conf b/debian/gbp.conf
new file mode 100644
index 0000000..a475fbf
--- /dev/null
+++ b/debian/gbp.conf
@@ -0,0 +1,3 @@
+[DEFAULT]
+pristine-tar = True
+debian-branch = wheezy
diff --git a/debian/patches/0001-close-potential-XXE-security-issue-CVE-2014-2053.patch b/debian/patches/0001-close-potential-XXE-security-issue-CVE-2014-2053.patch
new file mode 100644
index 0000000..8e6807c
--- /dev/null
+++ b/debian/patches/0001-close-potential-XXE-security-issue-CVE-2014-2053.patch
@@ -0,0 +1,26 @@
+From: James Heinrich <i...@silisoftware.com>
+Date: Wed, 12 Mar 2014 08:25:28 -0500
+Subject: close potential XXE security issue (CVE-2014-2053)
+
+http://websec.io/2012/08/27/Preventing-XEE-in-PHP.html
+
+Origin: upstream, https://github.com/JamesHeinrich/getID3/commit/dc8549079a24bb0619b6124ef2df767704f8d0bc
+---
+ getid3/getid3.lib.php | 6 +++++-
+ 1 file changed, 5 insertions(+), 1 deletion(-)
+
+diff --git a/getid3/getid3.lib.php b/getid3/getid3.lib.php
+index 723e2e2..e626027 100644
+--- a/getid3/getid3.lib.php
++++ b/getid3/getid3.lib.php
+@@ -523,6 +523,10 @@ class getid3_lib
+ 	static function XML2array($XMLstring) {
+ 		if (function_exists('simplexml_load_string')) {
+ 			if (function_exists('get_object_vars')) {
++				if (function_exists('libxml_disable_entity_loader')) { // (PHP 5 >= 5.2.11)
++					// http://websec.io/2012/08/27/Preventing-XEE-in-PHP.html
++					libxml_disable_entity_loader(true);
++				}
+ 				$XMLobject = simplexml_load_string($XMLstring);
+ 				return self::SimpleXMLelement2array($XMLobject);
+ 			}
diff --git a/debian/patches/series b/debian/patches/series
new file mode 100644
index 0000000..cb3bc0d
--- /dev/null
+++ b/debian/patches/series
@@ -0,0 +1 @@
+0001-close-potential-XXE-security-issue-CVE-2014-2053.patch

Attachment: signature.asc
Description: Digital signature

Reply via email to