Bug 1332443 (CVE-2016-3705)

Summary: CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: athmanem, cbuissar, c.david86, csutherl, dknox, erik-fedora, fedora-mingw, gzaronik, jclere, ktietz, lgao, mbabacek, mturk, myarboro, ohudlick, rjones, sardella, security-response-team, slawomir, twalsh, veillard, vpakolu, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
See Also: https://issues.redhat.com/browse/JWS-441
https://issues.redhat.com/browse/JBCS-102
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:51:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1332831, 1332832, 1332833, 1340367, 1340369, 1340370, 1340371    
Bug Blocks: 1332827, 1395463    
Attachments:
Description Flags
proposed patch none

Description Martin Prpič 2016-05-03 08:23:02 UTC
It is possible to trigger a stack overflow using a carefully crafted invalid xml file, the stack overflow occurs before libxml2 determines the xml file is invalid.

Upstream bug:

https://bugzilla.gnome.org/show_bug.cgi?id=765207

Comment 1 Martin Prpič 2016-05-03 08:27:34 UTC
Created attachment 1153279 [details]
proposed patch

Comment 3 Andrej Nemec 2016-05-04 07:32:05 UTC
Created libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1332831]

Comment 4 Andrej Nemec 2016-05-04 07:32:11 UTC
Created mingw-libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1332832]
Affects: epel-7 [bug 1332833]

Comment 5 Andrej Nemec 2016-05-04 07:32:25 UTC
Public via:

http://seclists.org/fulldisclosure/2016/May/10

Comment 6 Cedric Buissart 2016-05-25 08:25:25 UTC
Upstream commit for this issue : 
https://git.gnome.org/browse/libxml2/commit/?h=CVE-2016-3705&id=8f30bdff69edac9075f4663ce3b56b0c52d48ce6

Comment 9 errata-xmlrpc 2016-06-23 10:32:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292

Comment 10 errata-xmlrpc 2016-12-15 22:18:08 UTC
This issue has been addressed in the following products:



Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html