Bug 1788475
Summary: | CVE-2018-1311 xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs [epel-8] | ||||||
---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Marian Rehak <mrehak> | ||||
Component: | xerces-c | Assignee: | Troy Dawson <tdawson> | ||||
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
Severity: | high | Docs Contact: | |||||
Priority: | high | ||||||
Version: | epel8 | CC: | antti.andreimann, code, klember, tdawson, volker27, walter.pete | ||||
Target Milestone: | --- | Keywords: | Security, SecurityTracking | ||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | xerces-c-3.2.3-5.el8 xerces-c-3.2.5-1.el9 xerces-c-3.2.5-1.el8 | Doc Type: | No Doc Update | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2022-11-06 18:33:35 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 1788472 | ||||||
Attachments: |
|
Description
Marian Rehak
2020-01-07 10:15:32 UTC
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # low, medium, high, urgent (required) severity=high # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1788472,1788475 # Description of your update notes=Security fix for [PUT CVEs HERE] # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new Red Hat patched this in RHEL6-7 by converting the use-after-free to a memory leak (https://bugzilla.redhat.com/show_bug.cgi?id=1788472#c23). Upstream discussion: https://issues.apache.org/jira/browse/XERCESC-2188 It seems like upstream doesn’t necessarily feel like they can fix this, especially without breaking ABI, so the Red Hat patch may be the best thing available. Created attachment 1736458 [details]
Red Hat patch
I opened a PR for Fedora Rawhide to apply the Red Hat patch. It could be merged to F33/F32, and merged or cherry-picked to EPEL8. I’m not sure there is any reason not to go ahead and bring EPEL8 fully up-to-date with Rawhide; version 3.2.3 (https://issues.apache.org/jira/secure/ReleaseNote.jspa?version=12344135&styleName=Text&projectId=10510) does fix some bugs and should maintain ABI stability with 3.2.2. Thoughts? If xerces-c 3.2.3 maintains ABI stability, then I'm for it. Fedora rawhide and epel9 is still at version 3.2.3. We could build it based off either of them. This package has changed maintainer in Fedora. Reassigning to the new maintainer of this component. FEDORA-EPEL-2022-fac3491880 has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-fac3491880 FEDORA-EPEL-2022-fac3491880 has been pushed to the Fedora EPEL 8 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-fac3491880 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-EPEL-2022-fac3491880 has been pushed to the Fedora EPEL 8 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-EPEL-2023-75bf3d635e has been submitted as an update to Fedora EPEL 9. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-75bf3d635e FEDORA-EPEL-2023-f6a8bbe365 has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6a8bbe365 FEDORA-EPEL-2023-75bf3d635e has been pushed to the Fedora EPEL 9 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-75bf3d635e See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-EPEL-2023-f6a8bbe365 has been pushed to the Fedora EPEL 8 testing repository. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-f6a8bbe365 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-EPEL-2023-75bf3d635e has been pushed to the Fedora EPEL 9 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-EPEL-2023-f6a8bbe365 has been pushed to the Fedora EPEL 8 stable repository. If problem still persists, please make note of it in this bug report. |