Bug 18382 - jackson-dataformat-xml new security issue CVE-2016-3720
Summary: jackson-dataformat-xml new security issue CVE-2016-3720
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/687596/
Whiteboard: advisory MGA5-64-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2016-05-05 23:25 CEST by David GEIGER
Modified: 2016-05-17 21:19 CEST (History)
2 users (show)

See Also:
Source RPM: jackson-dataformat-xml-2.6.3-3.mga6
CVE:
Status comment:


Attachments
Suggested java insert for test program (1.29 KB, text/plain)
2016-05-10 08:44 CEST, Len Lawrence
Details
Serialization test for Simple.java class (1.48 KB, text/x-java)
2016-05-13 02:52 CEST, Len Lawrence
Details
tarfile containing test files for jackson-dataformat-xml (10.00 KB, application/octet-stream)
2016-05-14 21:10 CEST, Len Lawrence
Details

Description David GEIGER 2016-05-05 23:25:11 CEST
It was reported that XmlMapper in jackson-dataformat-xml is vulnerable to XXE attack ("Improper Restriction of XML External Entity Reference").

The issue should be fixed by applying the upstream patch:
https://github.com/FasterXML/jackson-dataformat-xml/commit/f0f19a4c924d9db9a1e2830434061c8640092cc0

Mageia 5 is also affected.


More info on the RedHat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1328427

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3720
David GEIGER 2016-05-05 23:25:27 CEST

QA Contact: (none) => security

David GEIGER 2016-05-05 23:25:43 CEST

Assignee: bugsquad => geiger.david68210

David GEIGER 2016-05-05 23:46:09 CEST

Component: RPM Packages => Security

David Walser 2016-05-05 23:52:19 CEST

Whiteboard: (none) => MGA5TOO

Comment 1 David GEIGER 2016-05-06 06:39:46 CEST
Fixed for Cauldron and mga5 too!

Assigning to QA,

Advisory:
========================

Updated jackson-dataformat-xml packages fix security vulnerability:

It was reported that XmlMapper in jackson-dataformat-xml is vulnerable to XXE attack ("Improper Restriction of XML External Entity Reference") (CVE-2016-3720).

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3720

========================

Updated packages in 5/core/updates_testing:
========================
jackson-dataformat-xml-2.4.3-3.1.mga5
jackson-dataformat-xml-javadoc-2.4.3-3.1.mga5


Source RPM: 
========================
jackson-dataformat-xml-2.4.3-3.1.mga5.src.rpm

Assignee: geiger.david68210 => qa-bugs

claire robinson 2016-05-06 11:32:05 CEST

Version: Cauldron => 5
Whiteboard: MGA5TOO => (none)

Comment 2 David Walser 2016-05-06 12:27:46 CEST
Thanks David!

Maybe we should add the RedHat bug to the references too?
https://bugzilla.redhat.com/show_bug.cgi?id=1328427
Comment 3 David GEIGER 2016-05-06 17:54:40 CEST
Yes we can :)

So please use this updated advisory:


Advisory:
========================

Updated jackson-dataformat-xml packages fix security vulnerability:

It was reported that XmlMapper in jackson-dataformat-xml is vulnerable to XXE attack ("Improper Restriction of XML External Entity Reference") (CVE-2016-3720).

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-3720
https://bugzilla.redhat.com/show_bug.cgi?id=1328427
========================
Comment 4 Len Lawrence 2016-05-10 08:44:12 CEST
Created attachment 7774 [details]
Suggested java insert for test program

Examples need java headers etc.  Run as e.g. java -jar test.jar

CC: (none) => tarazed25

Comment 5 Len Lawrence 2016-05-10 08:45:04 CEST
A simple test for this package looks easy to write, if you are a java programmer.
From the documentation at https://github.com/FasterXML/jackson-dataformat-xml and
http://stackoverflow.com/questions/3527264/how-to-create-a-pojo a POJO (PlainOldJavaObject) could be serialized and presumably deserialized with XmlMapper,
part of the Jackson extension.

Not having any java expertise, I have taken the liberty of attaching example POJOs from the documentation together with suggested usage.  All they need is a java framework I think.
Comment 6 Len Lawrence 2016-05-13 02:52:41 CEST
Created attachment 7791 [details]
Serialization test for Simple.java class

Don't rename this or any of the files.

Attachment 7774 is obsolete: 0 => 1

Comment 7 Len Lawrence 2016-05-13 02:53:24 CEST
Other attachments to follow.
Comment 8 Len Lawrence 2016-05-13 10:41:22 CEST
The serialization and deserialization work fine so this can be passed for x86_64.
In accordance with the policy of accepting tests of only one architecture it can be validated also.

Shall polish up the tests later.
Len Lawrence 2016-05-13 10:42:50 CEST

Keywords: (none) => validated_update
Whiteboard: (none) => MGA5-64-OK
CC: (none) => sysadmin-bugs

Comment 9 claire robinson 2016-05-13 12:35:33 CEST
Well done. Advisory uploaded.

Whiteboard: MGA5-64-OK => advisory MGA5-64-OK

Comment 10 Mageia Robot 2016-05-13 23:55:24 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0175.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 11 Len Lawrence 2016-05-14 21:10:20 CEST
Created attachment 7795 [details]
tarfile containing test files for jackson-dataformat-xml

The tests run in a Bash shell.

Attachment 7791 is obsolete: 0 => 1

David Walser 2016-05-17 21:19:43 CEST

URL: (none) => http://lwn.net/Vulnerabilities/687596/


Note You need to log in before you can comment on or make changes to this bug.