Bug 47487 - xerces-c: Multiple issues (4.3)
xerces-c: Multiple issues (4.3)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.3
All Linux
: P3 normal (vote)
: UCS 4.3-1-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-08-08 07:41 CEST by Quality Assurance
Modified: 2018-08-15 13:14 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2018-08-08 07:41:43 CEST
New Debian xerces-c 3.1.4+debian-2+deb9u1 fixes:
This update addresses the following issue(s):
* 
CVE_2012-0880 is open
* In Apache Xerces-C XML Parser library before 3.2.1, processing of external DTD paths can result in a null pointer dereference under certain conditions. (CVE-2017-12627)

3.1.4+debian-2+deb9u1 (Thu, 26 Apr 2018 00:35:59 -0400) * Fix CVE-2017-12627: Alberto Garcia, Francisco Oca and Suleman Ali of Offensive Research discovered that the Xerces-C XML parser mishandles certain kinds of external DTD references, resulting in dereference of a NULL pointer while processing the path to the DTD. The bug allows for a denial of service attack in applications that allow DTD processing and do not prevent external DTD usage, and could conceivably result in remote code execution. * Fix a regression that forced gcc to use SSE2, even on platforms that do not support it (e.g., i386). This caused program crashes due to invalid CPU instructions.
* CVE-2017-12627 xerces-c: Null pointer dereference while processing the path to DTD allows denial of service (CVE-2017-12627)
Comment 1 Quality Assurance univentionstaff 2018-08-08 19:06:18 CEST
--- mirror/ftp/4.3/unmaintained/4.3-0/source/xerces-c_3.1.4+debian-2.dsc
+++ apt/ucs_4.3-0-errata4.3-1/source/xerces-c_3.1.4+debian-2+deb9u1.dsc
@@ -1,3 +1,16 @@
+3.1.4+debian-2+deb9u1 [Thu, 26 Apr 2018 00:35:59 -0400] William Blough <devel@blough.us>:
+
+  * Fix CVE-2017-12627: Alberto Garcia, Francisco Oca and Suleman Ali of
+    Offensive Research discovered that the Xerces-C XML parser mishandles
+    certain kinds of external DTD references, resulting in dereference of a
+    NULL pointer while processing the path to the DTD. The bug allows for a
+    denial of service attack in applications that allow DTD processing and do
+    not prevent external DTD usage, and could conceivably result in remote code
+    execution.
+  * Fix a regression that forced gcc to use SSE2, even on platforms that do not
+    support it (e.g., i386).  This caused program crashes due to invalid CPU
+    instructions.
+
 3.1.4+debian-2 [Sun, 11 Dec 2016 14:38:45 -0500] William Blough <devel@blough.us>:
 
   * Fix AC_LANG_SOURCE warnings.

<http://10.200.17.11/4.3-1/#8017158011099936466>
Comment 2 Philipp Hahn univentionstaff 2018-08-09 08:14:09 CEST
OK: patches
OK: piuparts
OK: yaml
OK: errata-announce -V --only xerces-c.yaml

15ef360d49 Bug #47487: xerces-c 3.1.4+debian-2+deb9u1
 doc/errata/staging/xerces-c.yaml | 13 +++++++++++++
Comment 3 Arvid Requate univentionstaff 2018-08-15 13:14:41 CEST
<http://errata.software-univention.de/ucs/4.3/200.html>