Bug 1566749 (CVE-2017-18258)

Summary: CVE-2017-18258 libxml2: Unrestricted memory usage in xz_head() function in xzlib.c
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: athmanem, c.david86, csutherl, dmoppert, erik-fedora, gzaronik, jclere, ktietz, lgao, mbabacek, mturk, myarboro, ohudlick, rh-spice-bugs, rjones, slawomir, twalsh, veillard, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libxml2 2.9.6 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1566751, 1579211, 1566750, 1695417    
Bug Blocks: 1566752    

Description Laura Pardo 2018-04-12 23:04:07 UTC
A flaw was found in libxml2 before 2.9.6. The xz_head function in xzlib.c in allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.


References:
https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb

Comment 1 Laura Pardo 2018-04-12 23:04:37 UTC
Created mingw-libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1566751]
Affects: epel-7 [bug 1566750]

Comment 5 Doran Moppert 2019-04-03 02:49:06 UTC
Note that this patch introduced another vulnerability:  CVE-2018-14567 (flaw bug 1619875), which was in turn fixed by:

https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912