-
-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
libxml2: 2.9.3 -> 2.9.4 for three CVEs #15697
Conversation
- CVE-2016-4447: libxml2: Heap-based buffer underreads due to xmlParseName https://bugzilla.redhat.com/show_bug.cgi?id=1338686 - CVE-2016-4448 libxml2: Format string vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1338700 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content https://bugzilla.redhat.com/show_bug.cgi?id=1338701 and many other fixed issues, available at http://www.xmlsoft.org/news.html
No chance I'll be able to build and test all the depending packages :) |
- CVE-2016-4447: libxml2: Heap-based buffer underreads due to xmlParseName https://bugzilla.redhat.com/show_bug.cgi?id=1338686 - CVE-2016-4448 libxml2: Format string vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1338700 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content https://bugzilla.redhat.com/show_bug.cgi?id=1338701 and many other fixed issues, available at http://www.xmlsoft.org/news.html (cherry picked from commit 772851f)
Thank you, @vcunat! |
Unfortunately, there's a significant "regression" http://hydra.nixos.org/build/36154318/nixlog/1/raw. It might be that just some invalid code was previously accepted; I don't know ATM. |
Hmm, the test error persists even in latest XMLLibXML (2.0124). We might disable the tests, but I'd prefer to first make sure it's not some new bug in libxml. |
It does seem like a regression in libxml2: https://bugzilla.gnome.org/show_bug.cgi?id=766834. That's a bit unfortunate. |
Hmm, I see some of the CVEs were fixed by @peti :-) |
@vcunat, occupational hazard. :-) |
Should 809aa9c be reverted in the meantime? It broke the 16.03 channels. |
Reverting it would bring back security vulnerabilities, so I don't much like that. I was trying to find some public distro backporting (all) the patches, but I could find none yet, and doing it all myself would take quite some time. |
There's also the possibility that the breakage is caused by one of the security commits. |
... by reverting an upstream commit /cc #15697. I should make some distro pay me for digging into such things :-)
Tracked down, and rebuilding 16.03-small again is scheduled. |
@vcunat thanks, you (with a proper fix) were 5min faster than me :) |
Perhaps I should've written I was bisecting it; I didn't expect anyone reacting that fast. |
So is this resolved? |
It should be fine in staging and 16.03. I expect to merge staging to master today, after Hydra progresses a bit with the rebuild. (Github should mark this PR as merged at that point.) |
- CVE-2016-4447: libxml2: Heap-based buffer underreads due to xmlParseName https://bugzilla.redhat.com/show_bug.cgi?id=1338686 - CVE-2016-4448 libxml2: Format string vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1338700 - CVE-2016-4449 libxml2: Inappropriate fetch of entities content https://bugzilla.redhat.com/show_bug.cgi?id=1338701 and many other fixed issues, available at http://www.xmlsoft.org/news.html (cherry picked from commit 772851f)
... by reverting an upstream commit /cc NixOS#15697. I should make some distro pay me for digging into such things :-) (cherry picked from commit 3069606)
Motivation for this change
Things done
(nix.useSandbox on NixOS,
or option
build-use-sandbox
innix.conf
on non-NixOS)
nix-shell -p nox --run "nox-review wip"
./result/bin/
)https://bugzilla.redhat.com/show_bug.cgi?id=1338686
https://bugzilla.redhat.com/show_bug.cgi?id=1338700
https://bugzilla.redhat.com/show_bug.cgi?id=1338701
and many other fixed issues, available at http://www.xmlsoft.org/news.html
Please backport to 16.03 and 15.09.