Bug 18623

Summary: expat new security issues CVE-2012-6702 and CVE-2016-5300
Product: Mageia Reporter: David Walser <luigiwalser>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: lewyssmith, marja11, sysadmin-bugs, tmb
Version: 5Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: http://lwn.net/Vulnerabilities/690403/
Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK advisory
Source RPM: expat-2.1.1-2.mga6.src.rpm CVE:
Status comment:

Description David Walser 2016-06-04 23:25:26 CEST
CVEs have been assigned due to bad fixes for previous security issues:
http://openwall.com/lists/oss-security/2016/06/04/1
http://openwall.com/lists/oss-security/2016/06/04/5

Fixes for these have already been committed in upstream git, but I don't know which commits fix them.  The commit linked at the end of the thread only updates the changelog.  It sounds like there may be a new upstream release coming soon with the fixes, so maybe we'll have to wait for that, unless someone backports the right patches.
David Walser 2016-06-04 23:25:51 CEST

Whiteboard: (none) => MGA5TOO

Marja Van Waes 2016-06-05 13:51:33 CEST

CC: (none) => marja11
Assignee: bugsquad => shlomif

Comment 1 David Walser 2016-06-08 21:16:11 CEST
Debian has issued an advisory for this on June 7:
https://www.debian.org/security/2016/dsa-3597

Patched packages uploaded for Mageia 5 and Cauldron.

Testing procedure:
https://bugs.mageia.org/show_bug.cgi?id=5141#c7

Advisory:
========================

Updated expat packages fix security vulnerabilities:


An issue was introduced when CVE-2012-0876 was addressed. Stefan Sørensen
discovered that the use of the function XML_Parse() seeds the random number
generator generating repeated outputs for rand() calls (CVE-2012-6702).

Due to an incomplete solution for CVE-2012-0876, the parser poorly seeds the
random number generator allowing an attacker to cause a denial of service (CPU
consumption) via an XML file with crafted identifiers (CVE-2016-5300).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://www.debian.org/security/2016/dsa-3597
========================

Updated packages in core/updates_testing:
========================
expat-2.1.0-9.3.mga5
libexpat1-2.1.0-9.3.mga5
libexpat-devel-2.1.0-9.3.mga5

from expat-2.1.0-9.3.mga5.src.rpm

URL: (none) => http://lwn.net/Vulnerabilities/690403/
Version: Cauldron => 5
Assignee: shlomif => qa-bugs
Whiteboard: MGA5TOO => has_procedure

Comment 2 Lewis Smith 2016-06-10 21:29:46 CEST
Testing M5 x64

> Testing procedure:
> https://bugs.mageia.org/show_bug.cgi?id=5141#c7
We now have (thanks to David) a dedicated Wiki for this:
 https://wiki.mageia.org/en/QA_procedure:Expat
[Although I cannot find the link between 'xmlwf' and expat]

With both testdata.xml & testexpat.py; xmlwf gives no O/P if the file is OK.
BEFORE update:
 $ xmlwf /etc/xml/catalog
 $ xmlwf /etc/passwd
 /etc/passwd:1:16: not well-formed (invalid token)
 $ xmlwf testdata.xml
 $ python testexpat.py
 Tested OK

AFTER update:
 expat-2.1.0-9.3.mga5
 lib64expat1-2.1.0-9.3.mga5
 lib64expat-devel-2.1.0-9.3.mga5
Results were all the same as above, i.e. correct.
Update looks OK.

CC: (none) => lewyssmith
Whiteboard: has_procedure => has_procedure MGA5-64-OK

Comment 3 David Walser 2016-06-10 21:33:51 CEST
(In reply to Lewis Smith from comment #2)
> [Although I cannot find the link between 'xmlwf' and expat]

xmlwf is a command in the expat package.
Comment 4 David Walser 2016-06-12 01:13:42 CEST
Tested fine on Mageia 5 i586.

Whiteboard: has_procedure MGA5-64-OK => has_procedure MGA5-32-OK MGA5-64-OK

Comment 5 Lewis Smith 2016-06-15 21:36:01 CEST
Validating. Advisory to follow.

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 6 Thomas Backlund 2016-06-17 07:44:07 CEST
 advisory added

CC: (none) => tmb
Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK => has_procedure MGA5-32-OK MGA5-64-OK advisory

Comment 7 Mageia Robot 2016-06-17 07:58:51 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0227.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 8 David Walser 2016-06-20 17:46:15 CEST
(In reply to Thomas Backlund from comment #6)
>  advisory added

with an incorrect CVE identifier (2016 instead of 2012).  Fixed in SVN.