Bug 1332443 (CVE-2016-3705)
Summary: | CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | athmanem, cbuissar, c.david86, csutherl, dknox, erik-fedora, fedora-mingw, gzaronik, jclere, ktietz, lgao, mbabacek, mturk, myarboro, ohudlick, rjones, sardella, security-response-team, slawomir, twalsh, veillard, vpakolu, weli | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
See Also: |
https://issues.redhat.com/browse/JWS-441 https://issues.redhat.com/browse/JBCS-102 |
||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: |
Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.
|
Story Points: | --- | ||||
Clone Of: | Environment: | ||||||
Last Closed: | 2019-06-08 02:51:07 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1332831, 1332832, 1332833, 1340367, 1340369, 1340370, 1340371 | ||||||
Bug Blocks: | 1332827, 1395463 | ||||||
Attachments: |
|
Description
Martin Prpič
2016-05-03 08:23:02 UTC
Created attachment 1153279 [details]
proposed patch
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1332831] Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1332832] Affects: epel-7 [bug 1332833] Public via: http://seclists.org/fulldisclosure/2016/May/10 Upstream commit for this issue : https://git.gnome.org/browse/libxml2/commit/?h=CVE-2016-3705&id=8f30bdff69edac9075f4663ce3b56b0c52d48ce6 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 7 Via RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292 This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html |