-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0095
                      python-pysaml2 security update
                              13 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-pysaml2
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-10127  

Original Bulletin: 
   http://www.debian.org/security/2017/dsa-3759

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running python-pysaml2 check for an updated version of the software
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3759-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 12, 2017                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : python-pysaml2
CVE ID         : CVE-2016-10127
Debian Bug     : 850716

Matias P. Brutti discovered that python-pysaml2, a Python
implementation of the Security Assertion Markup Language 2.0, did not
correctly sanitize the XML messages it handled. This allowed a remote
attacker to perform XML External Entity attacks, leading to a wide
range of exploits.

For the stable distribution (jessie), this problem has been fixed in
version 2.0.0-1+deb8u1.

For the testing (stretch) and unstable (sid) distributions, this
problem has been fixed in version 3.0.0-5.

We recommend that you upgrade your python-pysaml2 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlh3KEQACgkQEL6Jg/PV
nWTjMQf+MQjGv4HoEMj7xp6EpheezdV5mCyXbq2/0WZCvpct+rp0I2mgXCMhHYCr
kRQNtRY8TIbV+lpbB9mKtNueGVvjWBqt17o6OFHUXacbW+VoMwwsRO9tHJfJY3b2
dCYcKfAj1o4/Zka/DhQFfNcjAzWvaCaOjMfqpPRl40guzJ/0C5UM5TnPuy1amKBZ
qurwjmeiG54B5dsm4k5NmKToCCT55Lexx6C9snkcvfPv+rrLPeBfQSYCwD7Qj+ZQ
kK04sY7TOBDKQjtI+mwz/jIzMepYb++89cDVoIvyWqmJ/l2Qbe3alF2B5kZY12uG
BAER3whGyVWTwXjIm6fxWkb8fQfVzw==
=FGtk
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KADC
-----END PGP SIGNATURE-----