Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1220607 - (CVE-2015-2716) CVE-2015-2716 Mozilla: Buffer overflow when parsing compressed XML (MFSA 2015-54)
CVE-2015-2716 Mozilla: Buffer overflow when parsing compressed XML (MFSA 2015...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20150512,repor...
: Security
Depends On: 1579625 1232574
Blocks: 1209788
  Show dependency treegraph
 
Reported: 2015-05-11 21:19 EDT by Huzaifa S. Sidhpurwala
Modified: 2018-05-18 00:20 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:0988 normal SHIPPED_LIVE Critical: firefox security update 2015-05-12 18:49:54 EDT
Red Hat Product Errata RHSA-2015:1012 normal SHIPPED_LIVE Important: thunderbird security update 2015-05-18 09:03:41 EDT

  None (edit)
Description Huzaifa S. Sidhpurwala 2015-05-11 21:19:04 EDT
Security researcher Ucha Gobejishvili used the Address Sanitizer tool to find a buffer overflow while parsing compressed XML content. This was due to an error in how buffer space is created and modified when handling large amounts of XML data. This results in a potentially exploitable crash.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.



External Reference:

http://www.mozilla.org/security/announce/2015/mfsa2015-54.html


Acknowledgements:

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Ucha Gobejishvili as the original reporter.
Comment 1 errata-xmlrpc 2015-05-12 14:50:44 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 5

Via RHSA-2015:0988 https://rhn.redhat.com/errata/RHSA-2015-0988.html
Comment 3 errata-xmlrpc 2015-05-18 05:04:54 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 7
  Red Hat Enterprise Linux 6

Via RHSA-2015:1012 https://rhn.redhat.com/errata/RHSA-2015-1012.html
Comment 4 Huzaifa S. Sidhpurwala 2015-06-17 01:14:28 EDT
Created expat tracking bugs for this issue:

Affects: fedora-all [bug 1232574]
Comment 5 Huzaifa S. Sidhpurwala 2015-06-17 01:15:50 EDT
The following patch was applied by Mozilla to fix this issue:

https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
Comment 6 Huzaifa S. Sidhpurwala 2015-06-17 01:18:03 EDT
Statement:

This issue affects the version of expat package as shipped with Red Hat Enterprise Linux 5, 6 and 7. Red Hat Product Security has rated this issue as having Moderate security impact, a future update may address this flaw.

Red Hat Enterprise Linux 5 is now in Extended Life Cycle phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates.

Note You need to log in before you can comment on or make changes to this bug.