Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1332443 - (CVE-2016-3705) CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file
CVE-2016-3705 libxml2: stack overflow before detecting invalid XML file
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160503,repor...
: Security
Depends On: 1332833 1332831 1332832 1340367 1340369 1340370 1340371
Blocks: 1332827 1395463
  Show dependency treegraph
 
Reported: 2016-05-03 04:23 EDT by Martin Prpič
Modified: 2018-05-02 12:21 EDT (History)
24 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Missing incrementation of recursion depth counter were found in the xmlParserEntityCheck() and xmlParseAttValueComplex() functions used for parsing XML data. An attacker could launch a Denial of Service attack by passing specially crafted XML data to an application, forcing it to crash due to stack exhaustion.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
proposed patch (2.18 KB, text/plain)
2016-05-03 04:27 EDT, Martin Prpič
no flags Details


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1292 normal SHIPPED_LIVE Important: libxml2 security update 2016-07-18 13:29:39 EDT
Red Hat Product Errata RHSA-2016:2957 normal SHIPPED_LIVE Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release 2016-12-15 22:11:19 EST

  None (edit)
Description Martin Prpič 2016-05-03 04:23:02 EDT
It is possible to trigger a stack overflow using a carefully crafted invalid xml file, the stack overflow occurs before libxml2 determines the xml file is invalid.

Upstream bug:

https://bugzilla.gnome.org/show_bug.cgi?id=765207
Comment 1 Martin Prpič 2016-05-03 04:27 EDT
Created attachment 1153279 [details]
proposed patch
Comment 3 Andrej Nemec 2016-05-04 03:32:05 EDT
Created libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1332831]
Comment 4 Andrej Nemec 2016-05-04 03:32:11 EDT
Created mingw-libxml2 tracking bugs for this issue:

Affects: fedora-all [bug 1332832]
Affects: epel-7 [bug 1332833]
Comment 5 Andrej Nemec 2016-05-04 03:32:25 EDT
Public via:

http://seclists.org/fulldisclosure/2016/May/10
Comment 6 Cedric Buissart 2016-05-25 04:25:25 EDT
Upstream commit for this issue : 
https://git.gnome.org/browse/libxml2/commit/?h=CVE-2016-3705&id=8f30bdff69edac9075f4663ce3b56b0c52d48ce6
Comment 9 errata-xmlrpc 2016-06-23 06:32:39 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6
  Red Hat Enterprise Linux 7

Via RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292
Comment 10 errata-xmlrpc 2016-12-15 17:18:08 EST
This issue has been addressed in the following products:



Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html

Note You need to log in before you can comment on or make changes to this bug.