Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 509834 (CVE-2014-0191) - <dev-libs/libxml2-2.9.1-r4: "xmlParserHandlePEReference()" Entity Expansion Denial of Service Vulnerability (CVE-2014-0191)
Summary: <dev-libs/libxml2-2.9.1-r4: "xmlParserHandlePEReference()" Entity Expansion D...
Status: RESOLVED FIXED
Alias: CVE-2014-0191
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/58018/
Whiteboard: A3 [glsa]
Keywords:
Depends on: 509856 510508 511146
Blocks:
  Show dependency tree
 
Reported: 2014-05-08 07:39 UTC by Agostino Sarubbo
Modified: 2015-06-17 17:30 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-05-08 07:39:10 UTC
From ${URL} :

Description

A vulnerability has been reported in libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service) of an application using the library.

The vulnerability is caused due to an error in the "xmlParserHandlePEReference()" function (parser.c) when expanding entity references and can be exploited to consume large amounts of memory and cause a crash or hang via a specially crafted XML file containing malicious 
attributes.

Solution:
Fixed in the source code repository.

Further details available to Secunia VIM customers

Provided and/or discovered by:
Daniel Berrange, Red Hat.

Original Advisory:
llibxml2:
https://git.gnome.org/browse/libxml2/commit/?id=9cd1c3cfbd32655d60572c0a413e017260c854df

Red Hat:
https://bugzilla.redhat.com/show_bug.cgi?id=1090976


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Alexandre Rostovtsev (RETIRED) gentoo-dev 2014-05-08 15:40:54 UTC
Thanks for reporting. Fixed in =dev-libs/libxml2-2.9.1-r3; it should be stabilized, but a multilib version of icu needs to be stabilized first (bug #509856).

+*libxml2-2.9.1-r3 (08 May 2014)
+
+  08 May 2014; Alexandre Rostovtsev <tetromino@gentoo.org>
+  +libxml2-2.9.1-r3.ebuild, +files/libxml2-2.9.1-external-param-entities.patch:
+  Fix denial of service vulnerability (CVE-2014-0191, bug #509834, thanks to
+  Agostino Sarubbo). Enable support for Python 3.4. Modernize python build as
+  suggested by Michał Górny
Comment 2 Alexandre Rostovtsev (RETIRED) gentoo-dev 2014-05-10 16:00:45 UTC
Arches, please test and stabilize =dev-libs/libxml2-2.9.1-r3
Target: all stable arches.

Note that first you will need to stabilize icu-51.2-r2 (bug #509856).
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2014-05-10 17:46:16 UTC
Stable for HPPA.
Comment 4 Markus Meier gentoo-dev 2014-05-15 20:05:55 UTC
arm stable
Comment 5 Markos Chandras (RETIRED) gentoo-dev 2014-05-16 21:46:58 UTC
Please consider stopping the stabilization.

The security patch applied to -r3 causes build problems for sys-auth/sssd[manpages]. Could you please review the patch and make sure it's correct? I opened bug #509834
Comment 6 Markos Chandras (RETIRED) gentoo-dev 2014-05-16 21:47:23 UTC
Please consider stopping the stabilization.

The security patch applied to -r3 causes build problems for sys-auth/sssd[manpages]. Could you please review the patch and make sure it's correct? I opened bug #509834(In reply to Markos Chandras from comment #5)
> Please consider stopping the stabilization.
> 
> The security patch applied to -r3 causes build problems for
> sys-auth/sssd[manpages]. Could you please review the patch and make sure
> it's correct? I opened bug #509834

I meant bug #510508
Comment 7 Alexandre Rostovtsev (RETIRED) gentoo-dev 2014-05-17 03:01:28 UTC
(In reply to Markos Chandras from comment #5)
(In reply to Markos Chandras from comment #6)

Thanks for reporting this; fixed in -r4.

Arches, please test and stabilize =dev-libs/libxml2-2.9.1-r4

Target: all stable arches, including hppa and arm who already stabilized -r3, because -r3 will break builds and/or tests for packages that use xmllint for validating docbook etc. documents.
Comment 8 Jeroen Roovers (RETIRED) gentoo-dev 2014-05-17 04:25:47 UTC
(In reply to Alexandre Rostovtsev from comment #7)
> Thanks for reporting this; fixed in -r4.

garblegarble -r4

> Arches, please test and stabilize =dev-libs/libxml2-2.9.1-r4

garblegarble garblegarble* =dev-libs/libxml2-2.9.1-r4 ? garblegarble garblegarble !

Please, next time, put each atom on a separate line.

> Target: all stable arches, including hppa and arm who already stabilized
> -r3, because -r3 will break builds and/or tests for packages that use
> xmllint for validating docbook etc. documents.

What targets?

garblegarble garblegarble*hppa* garblegarble arm *garblegarble -- somethinggarblegarble! -r3 garblegarble because garblegarble. garblegarble!


Oh, so that's:

----------------------------------------------------
Arch teams, here's the bait:

=dev-libs/libxml2-2.9.1-r4

Targets: alpha amd64 arm arm64 hppa ia64 ppc ppc64 sparc x86
----------------------------------------------------

See how that's actually recognisable and legible?
Comment 9 Alexandre Rostovtsev (RETIRED) gentoo-dev 2014-05-17 04:39:22 UTC
(In reply to Jeroen Roovers from comment #8)

Is it too much to expect that the comment which adds an arch to the CC list would be read by a living human being subscribed to that arch's alias, and not just by a whitespace-sensitive regexp?
Comment 10 Agostino Sarubbo gentoo-dev 2014-05-17 10:39:29 UTC
amd64 stable
Comment 11 Agostino Sarubbo gentoo-dev 2014-05-17 10:39:57 UTC
x86 stable
Comment 12 Agostino Sarubbo gentoo-dev 2014-05-17 13:51:15 UTC
alpha stable
Comment 13 Jeroen Roovers (RETIRED) gentoo-dev 2014-05-17 15:47:57 UTC
(In reply to Alexandre Rostovtsev from comment #9)
> (In reply to Jeroen Roovers from comment #8)
> 
> Is it too much to expect that the comment which adds an arch to the CC list
> would be read by a living human being subscribed to that arch's alias, and
> not just by a whitespace-sensitive regexp?

I don't use a script. I skim the comments looking to find something that looks like a human-readable instruction for architecture developers that includes a couple of vital bits of information. Because indeed, what comment "[added] an arch to the CC list"? When some of those bits are hard to find or missing, I skim more comments looking for clues. This can easily take minutes of my time as opposed to a few seconds. Now multiply that by the number of people who you wrote that information for in the first place.

Do you mean you read news books, papers, websites and e-mails without
text formatting and proper spacing exactly like you would read
properly formatted text? Or do you mean that text formatting is too much work to expect one
person to perform for a readership of a mere few dozen? Or do you mean that scripts should not take the work of honest humans? (Because making your text readable by scripts and humans alike sounds like an excellent plan, so yes, why don't we expect it, indeed?)
Comment 14 Jeroen Roovers (RETIRED) gentoo-dev 2014-05-17 16:25:11 UTC
Stable for HPPA.
Comment 15 Markus Meier gentoo-dev 2014-05-25 18:56:07 UTC
arm stable
Comment 16 Agostino Sarubbo gentoo-dev 2014-06-08 10:42:16 UTC
ia64 stable
Comment 17 Agostino Sarubbo gentoo-dev 2014-06-08 10:45:54 UTC
ppc64 stable
Comment 18 Agostino Sarubbo gentoo-dev 2014-06-08 10:49:13 UTC
ppc stable
Comment 19 Agostino Sarubbo gentoo-dev 2014-06-08 10:51:48 UTC
sparc stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 20 Yury German Gentoo Infrastructure gentoo-dev 2014-06-17 21:08:01 UTC
Arches, Thank you for your work
Maintainer(s), please drop the vulnerable version.

New GLSA Request filed.
Comment 21 Alexandre Rostovtsev (RETIRED) gentoo-dev 2014-06-18 03:17:01 UTC
Vulnerable versions cleaned up.

+  18 Jun 2014; Alexandre Rostovtsev <tetromino@gentoo.org>
+  -libxml2-2.9.1-r1.ebuild, -libxml2-2.9.1-r2.ebuild, -libxml2-2.9.1-r3.ebuild:
+  Punt old and vulnerable versions.
Comment 22 Yury German Gentoo Infrastructure gentoo-dev 2014-06-18 17:31:31 UTC
Maintainer(s), Thank you for cleanup!
Comment 23 GLSAMaker/CVETool Bot gentoo-dev 2014-09-19 19:09:08 UTC
This issue was resolved and addressed in
 GLSA 201409-08 at http://security.gentoo.org/glsa/glsa-201409-08.xml
by GLSA coordinator Kristian Fiskerstrand (K_F).
Comment 24 GLSAMaker/CVETool Bot gentoo-dev 2015-06-17 17:30:26 UTC
CVE-2014-0191 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0191):
  The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2,
  as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware
  11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external
  parameter entities regardless of whether entity substitution or validation
  is enabled, which allows remote attackers to cause a denial of service
  (resource consumption) via a crafted XML document.