Bug 13166 - prosody, lua-expat new denial of service security issue (CVE-2014-2744 and CVE-2014-2745)
Summary: prosody, lua-expat new denial of service security issue (CVE-2014-2744 and CV...
Status: RESOLVED OLD
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Thierry Vignaud
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/593605/
Whiteboard: MGA3TOO
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-07 23:49 CEST by David Walser
Modified: 2015-09-02 17:36 CEST (History)
5 users (show)

See Also:
Source RPM: prosody-0.8.2-7.mga4.src.rpm, lua-expat-1.2.0-4.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-04-07 23:49:24 CEST
Debian has issued an advisory on April 6:
https://www.debian.org/security/2014/dsa-2895

Mageia 3 and Mageia 4 are also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2014-04-07 23:49:35 CEST

CC: (none) => pterjan
Whiteboard: (none) => MGA4TOO, MGA3TOO

Comment 1 David Walser 2014-04-07 23:50:48 CEST
I believe this oss-security thread is related to this:
http://openwall.com/lists/oss-security/2014/04/07/7

No CVEs have been allocated yet, but may be at a later time.
Comment 2 David Walser 2014-04-09 16:00:46 CEST
CVEs and more details:
http://openwall.com/lists/oss-security/2014/04/09/1

Summary: prosody, lua-expat new denial of service security issue => prosody, lua-expat new denial of service security issue (CVE-2014-2744 and CVE-2014-2745)

Comment 3 David Walser 2014-04-21 18:30:58 CEST
A regression in the initial prosody update has been corrected:
http://lwn.net/Alerts/595553/
Comment 4 David Walser 2014-04-30 23:22:12 CEST
Patched packages uploaded for Mageia 3, Mageia 4, and Cauldron.

Advisory:
========================

Updated prosody and lua-expat packages fix security vulnerabilities:

A denial-of-service vulnerability has been reported in Prosody before 0.9.4.
If compression is enabled, an attacker might send highly-compressed XML
elements (attack known as "zip bomb") over XMPP streams and consume all the
resources of the server (CVE-2014-2744, CVE-2014-2745).

The SAX XML parser lua-expat, prior to 1.3.0, is also affected by these
issues.

Both packages have been patches to correct these flaws.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2745
http://openwall.com/lists/oss-security/2014/04/09/1
https://www.debian.org/security/2014/dsa-2895
========================

Updated packages in core/updates_testing:
========================
prosody-0.8.2-6.1.mga3
lua-expat-1.2.0-3.1.mga3
prosody-0.8.2-7.1.mga4
lua-expat-1.2.0-4.1.mga4

from SRPMS:
prosody-0.8.2-6.1.mga3.src.rpm
lua-expat-1.2.0-3.1.mga3.src.rpm
prosody-0.8.2-7.1.mga4.src.rpm
lua-expat-1.2.0-4.1.mga4.src.rpm

CC: (none) => thierry.vignaud
Version: Cauldron => 4
Assignee: thierry.vignaud => qa-bugs
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO

Comment 5 claire robinson 2014-05-02 18:08:53 CEST
Lua-expat is a require of prosody, which itself is an XMPP/Jabber server.

Testing by ensuring prosody service can be started.

Testing mga4 64

# systemctl start prosody.service 
Job for prosody.service failed. See 'systemctl status prosody.service' and 'journalctl -xn' for details.

# systemctl status -a prosody.service 
prosody.service - LSB: The prosody small XMPP/Jabber server
   Loaded: loaded (/etc/rc.d/init.d/prosody)
   Active: failed (Result: exit-code) since Fri 2014-05-02 17:02:11 BST; 1min 8s ago
  Process: 2542 ExecStart=/etc/rc.d/init.d/prosody start (code=exited, status=1/FAILURE)
su[2547]: (to prosody) root on none
prosody[2542]: Starting prosody: lua: /usr/bin/prosody:339: invalid escape sequence near '\s'
prosody[2542]: [FAILED]
systemd[1]: prosody.service: control process exited, code=exited status=1
systemd[1]: Failed to start LSB: The prosody small XMPP/Jabber server.
systemd[1]: Unit prosody.service entered failed state.


Seems this was reported in mga2 and eventually closed as old :( bug 7682

Adding lua-filesystem has no effect.

Whiteboard: MGA3TOO => MGA3TOO feedback

Comment 6 claire robinson 2014-05-23 13:19:23 CEST
Assigning back to you David. Please reassign when there you're ready. Thanks.

Assignee: qa-bugs => luigiwalser
Whiteboard: MGA3TOO feedback => MGA3TOO

claire robinson 2014-05-23 13:19:39 CEST

CC: (none) => qa-bugs

Comment 7 David Walser 2014-05-23 13:48:32 CEST
Assigning to tv, who last updated the package.

Assignee: luigiwalser => thierry.vignaud

Comment 8 David Walser 2014-08-13 21:39:30 CEST
CC'ing Remí who was working on these packages in Cauldron and might be able to help fix this.

CC: (none) => remi

Comment 9 David Walser 2015-05-11 14:42:00 CEST
Fedora has now fixed this in Fedora 20:
https://lists.fedoraproject.org/pipermail/package-announce/2015-May/157595.html

It sounds like they may also have a solution for the lua5.1/lua5.2 issue.
Comment 10 Nicolas Lécureuil 2015-05-15 00:20:35 CEST
do we keep this old prosody release or do we update ?

CC: (none) => mageia

Comment 11 David Walser 2015-05-15 01:28:42 CEST
If updating it helps, I see no reason not to.  I don't think that solves the lua issue though.  Remí can say more about that.
Comment 12 Rémi Verschelde 2015-05-15 09:52:10 CEST
As far as I remember, prosody never worked because it's badly packaged. And nobody seems to care about it, that's why we dropped it from cauldron.

So IMO we should patch lua-expat, and maybe update the source tarball of prosody if we want to make sure that there is no underlying security vulnerability that could hit people who fixed their prosody install. But we probably shouldn't bother making it work out of the box.
Comment 13 David Walser 2015-09-02 17:36:10 CEST
With only a couple of weeks remaining in Mageia 4's lifetime, we don't have time to fix this and test it.  This package has been dropped and no longer exists in Mageia as of Mageia 5.  Closing this as OLD.

Status: NEW => RESOLVED
Resolution: (none) => OLD


Note You need to log in before you can comment on or make changes to this bug.