A buffer overflow bug was found in the expat library: https://github.com/libexpat/libexpat/issues/317 which upstream fixed in version 2.2.8. The cauldron expat package has already been updated to a new version.
Updated packages are available for testing: SRPM expat-2.2.7-1.1.mga7.src.rpm RPMS expat-2.2.7-1.1.mga7 lib(64)expat1-2.2.7-1.1.mga7 lib(64)expat-devel-2.2.7-1.1.mga7 Results of make check on x86-64: For the local RPM build, I first added only the new test case for this bug: ======================================= expat 2.2.7: tests/test-suite.log ======================================= # TOTAL: 2 # PASS: 0 # SKIP: 0 # XFAIL: 0 # FAIL: 2 # XPASS: 0 # ERROR: 0 .. contents:: :depth: 2 FAIL: runtests ============== ERROR: Parsing was expected to fail but succeeded. Expat version: expat_2.2.7 99%: Checks: 330, Failed: 1 FAIL runtests (exit status: 1) FAIL: runtestspp ================ ERROR: Parsing was expected to fail but succeeded. Expat version: expat_2.2.7 99%: Checks: 330, Failed: 1 FAIL runtestspp (exit status: 1) After also adding the patch with a fix for this bug: ======================================= expat 2.2.7: tests/test-suite.log ======================================= # TOTAL: 2 # PASS: 2 # SKIP: 0 # XFAIL: 0 # FAIL: 0 # XPASS: 0 # ERROR: 0 .. contents:: :depth: 2 So the back-ported patch appears to fix the problem without breaking the other tests.
advisory: It was discovered that Expat did not properly handle internal entities closing the doctype, potentially resulting in denial of service or information disclosure if a malformed XML file is processed (CVE-2019-15903). References: https://github.com/libexpat/libexpat/issues/317 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903
Assignee: cjw => qa-bugsCC: (none) => cjw
MGA7-64 Plasma on Lenovo B50 No installation issues. Followed tests as per https://wiki.mageia.org/en/QA_procedure:Expat $ python testexpat.py Tested OK $ xmlwf /etc/xml/catalog $ xmlwf /etc/passwd /etc/passwd:1:16: not well-formed (invalid token) Is OK.
Whiteboard: (none) => MGA7-64-OKCC: (none) => herman.viaene
Validating. Advisory in Comment 2.
Keywords: (none) => validated_updateCC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => advisoryCC: (none) => tmb
An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0321.html
Resolution: (none) => FIXEDStatus: NEW => RESOLVED