Summary: | <dev-libs/expat-2.1.1-r2: Using XML_Parse before rand() results in non-random output (CVE-{2012-6702,2016-5300}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | freedesktop-bugs |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1319731 | ||
See Also: | https://bugzilla.redhat.com/show_bug.cgi?id=1197087 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2016-03-21 13:36:20 UTC
In Git now: https://github.com/gentoo/gentoo/commit/04f12ff7fde845e4fc896786719fbd6a2e727666 Stabilize? @arches, please stabilize: =dev-libs/expat-2.1.1-r2 Stable on alpha. Stable for PPC64. Stable for HPPA. arm stable CVE-2016-5300 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5300): The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876. amd64 stable x86 stable. Maintainer(s), please cleanup. Added to existing GLSA. This issue was resolved and addressed in GLSA 201701-21 at https://security.gentoo.org/glsa/201701-21 by GLSA coordinator Aaron Bauman (b-man). |