Bug 1437311 (CVE-2017-1000061)
Summary: | CVE-2017-1000061 xmlsec1: xmlsec vulnerable to external entity expansion | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Doran Moppert <dmoppert> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ssorce, tmraz, veillard |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
It was discovered xmlsec1's use of libxml2 inadvertently enabled external entity expansion (XXE) along with validation. An attacker could craft an XML file that would cause xmlsec1 to try and read local files or HTTP/FTP URLs, leading to information disclosure or denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-08-21 05:36:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1472089, 1472090, 1472091, 1472092 | ||
Bug Blocks: | 1395614 |
Description
Doran Moppert
2017-03-30 03:41:50 UTC
Is this affecting only the command line utility ? (In reply to Simo Sorce from comment #2) > Is this affecting only the command line utility ? The library is affected as well, as it uses libxml2 in the same way. I see no patch for the library upstream. What's the recommendation ? (In reply to Simo Sorce from comment #4) > I see no patch for the library upstream. > What's the recommendation ? The merge request on the upstream ticket applies to the library as well (xmlSecInit() in src/xmlsec.c). Upstream patch: https://github.com/lsh123/xmlsec/pull/93/files Created xmlsec1 tracking bugs for this issue: Affects: epel-7 [bug 1472090] Affects: fedora-all [bug 1472089] This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2492 https://access.redhat.com/errata/RHSA-2017:2492 |