Bug 26090 - xmlrpc new security issue CVE-2019-17570
Summary: xmlrpc new security issue CVE-2019-17570
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA7-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2020-01-16 14:19 CET by David Walser
Modified: 2020-02-09 20:15 CET (History)
5 users (show)

See Also:
Source RPM: xmlrpc-3.1.3-73.mga7.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2020-01-16 14:19:59 CET
A security issue in Apache xmlrpc has been announced today (January 16):
https://www.openwall.com/lists/oss-security/2020/01/16/1

It doesn't sound like there's a fix available yet.

Mageia 7 is also affected.
David Walser 2020-01-16 14:20:12 CET

Whiteboard: (none) => MGA7TOO

Comment 1 David Walser 2020-01-25 03:33:26 CET
A PoC is available:
https://www.openwall.com/lists/oss-security/2020/01/24/2
Comment 2 David Walser 2020-01-30 23:11:22 CET
RedHat has issued an advisory for this on January 30:
https://access.redhat.com/errata/RHSA-2020:0310

Patch attached to the bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1775193

Status comment: (none) => Patch available from RedHat

Comment 3 David Walser 2020-01-30 23:19:36 CET
Debian-LTS has issued an advisory for this today (January 30):
https://www.debian.org/lts/security/2020/dla-2078
Comment 4 David GEIGER 2020-01-31 07:36:52 CET
Done for both Cauldron and mga7!

CC: (none) => geiger.david68210

Comment 5 David Walser 2020-01-31 15:22:09 CET
Advisory:
========================

Updated xmlrpc packages fix security vulnerability:

A flaw was discovered where the XMLRPC client implementation in Apache XMLRPC,
performed deserialization of the server-side exception serialized in the
faultCause attribute of XMLRPC error response messages. A malicious or
compromised XMLRPC server could possibly use this flaw to execute arbitrary
code with the privileges of an application using the Apache XMLRPC client
library (CVE-2019-17570).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17570
https://access.redhat.com/errata/RHSA-2020:0310
========================

Updated packages in core/updates_testing:
========================
xmlrpc-javadoc-3.1.3-73.1.mga7
xmlrpc-common-3.1.3-73.1.mga7
xmlrpc-client-3.1.3-73.1.mga7
xmlrpc-server-3.1.3-73.1.mga7

from xmlrpc-3.1.3-73.1.mga7.src.rpm

Whiteboard: MGA7TOO => (none)
Assignee: java => qa-bugs
Status comment: Patch available from RedHat => (none)
Version: Cauldron => 7

Comment 6 Herman Viaene 2020-02-07 14:44:02 CET
MGA7-64 Plasma on Lenovo B50
No installation issues.
On the authority as expressed in bug 23105, OK on clean install.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA7-64-OK

Comment 7 Thomas Andrews 2020-02-07 19:13:02 CET
Validating. Advisory in Comment 5.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Thomas Backlund 2020-02-09 19:07:59 CET

Keywords: (none) => advisory
CC: (none) => tmb

Comment 8 Mageia Robot 2020-02-09 20:15:04 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2020-0077.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.