[OE-core] [PATCH] libxml2: fix CVE-2014-3660
akuster808
akuster808 at gmail.com
Thu Nov 27 15:31:55 UTC 2014
On 11/27/2014 05:58 AM, Ahsan, Noor wrote:
> Hi,
>
> Sorry for the false alarm. It was included in master but not in dizzy branch. Kindly include in that branch as well. Thanks.
Sure thing.
thanks for the reminder.
- Armin
>
> Noor
>
> -----Original Message-----
> From: Ahsan, Noor
> Sent: Thursday, November 27, 2014 6:45 PM
> To: 'Joe MacDonald'; openembedded-core at lists.openembedded.org
> Subject: RE: [OE-core] [PATCH] libxml2: fix CVE-2014-3660
>
> Hello,
>
> We sent out this patch but we haven't received any feedback not it was included. Kindly include this in dizzy branch.
>
> Thanks.
>
> Noor
>
> -----Original Message-----
> From: openembedded-core-bounces at lists.openembedded.org [mailto:openembedded-core-bounces at lists.openembedded.org] On Behalf Of Joe MacDonald
> Sent: Monday, October 20, 2014 10:51 PM
> To: openembedded-core at lists.openembedded.org
> Subject: [OE-core] [PATCH] libxml2: fix CVE-2014-3660
>
> It was discovered that the patch for CVE-2014-0191 for libxml2 is incomplete. It is still possible to have libxml2 incorrectly perform entity substituton even when the application using libxml2 explicitly disables the feature. This can allow a remote denial-of-service attack on systems with libxml2 prior to 2.9.2.
>
> References:
> http://www.openwall.com/lists/oss-security/2014/10/17/7
> https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
>
> Signed-off-by: Joe MacDonald <joe_macdonald at mentor.com>
> ---
> meta/recipes-core/libxml/libxml2.inc | 1 +
> .../libxml/libxml2/libxml2-CVE-2014-3660.patch | 147 +++++++++++++++++++++
> 2 files changed, 148 insertions(+)
> create mode 100644 meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-3660.patch
>
> diff --git a/meta/recipes-core/libxml/libxml2.inc b/meta/recipes-core/libxml/libxml2.inc
> index bcf9a62..c729c19 100644
> --- a/meta/recipes-core/libxml/libxml2.inc
> +++ b/meta/recipes-core/libxml/libxml2.inc
> @@ -21,6 +21,7 @@ SRC_URI = "ftp://xmlsoft.org/libxml2/libxml2-${PV}.tar.gz;name=libtar \
> file://libxml2-CVE-2014-0191-fix.patch \
> file://python-sitepackages-dir.patch \
> file://libxml-m4-use-pkgconfig.patch \
> + file://libxml2-CVE-2014-3660.patch \
> "
>
> BINCONFIG = "${bindir}/xml2-config"
> diff --git a/meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-3660.patch b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-3660.patch
> new file mode 100644
> index 0000000..b9621c9
> --- /dev/null
> +++ b/meta/recipes-core/libxml/libxml2/libxml2-CVE-2014-3660.patch
> @@ -0,0 +1,147 @@
> +From be2a7edaf289c5da74a4f9ed3a0b6c733e775230 Mon Sep 17 00:00:00 2001
> +From: Daniel Veillard <veillard at redhat.com>
> +Date: Thu, 16 Oct 2014 13:59:47 +0800
> +Subject: Fix for CVE-2014-3660
> +
> +Issues related to the billion laugh entity expansion which happened to
> +escape the initial set of fixes
> +
> +Upstream-status: Backport
> +Reference:
> +https://git.gnome.org/browse/libxml2/commit/?id=be2a7edaf289c5da74a4f9e
> +d3a0b6c733e775230&context=3&ignorews=0&ss=0
> +
> +Signed-off-by: Joe MacDonald <joe_macdonald at mentor.com>
> +
> +diff --git a/parser.c b/parser.c
> +index f51e8d2..1d93967 100644
> +--- a/parser.c
> ++++ b/parser.c
> +@@ -130,6 +130,29 @@ xmlParserEntityCheck(xmlParserCtxtPtr ctxt, size_t size,
> + return (0);
> + if (ctxt->lastError.code == XML_ERR_ENTITY_LOOP)
> + return (1);
> ++
> ++ /*
> ++ * This may look absurd but is needed to detect
> ++ * entities problems
> ++ */
> ++ if ((ent != NULL) && (ent->etype != XML_INTERNAL_PREDEFINED_ENTITY) &&
> ++ (ent->content != NULL) && (ent->checked == 0)) {
> ++ unsigned long oldnbent = ctxt->nbentities;
> ++ xmlChar *rep;
> ++
> ++ ent->checked = 1;
> ++
> ++ rep = xmlStringDecodeEntities(ctxt, ent->content,
> ++ XML_SUBSTITUTE_REF, 0, 0, 0);
> ++
> ++ ent->checked = (ctxt->nbentities - oldnbent + 1) * 2;
> ++ if (rep != NULL) {
> ++ if (xmlStrchr(rep, '<'))
> ++ ent->checked |= 1;
> ++ xmlFree(rep);
> ++ rep = NULL;
> ++ }
> ++ }
> + if (replacement != 0) {
> + if (replacement < XML_MAX_TEXT_LENGTH)
> + return(0);
> +@@ -189,9 +212,12 @@ xmlParserEntityCheck(xmlParserCtxtPtr ctxt, size_t size,
> + return (0);
> + } else {
> + /*
> +- * strange we got no data for checking just return
> ++ * strange we got no data for checking
> + */
> +- return (0);
> ++ if (((ctxt->lastError.code != XML_ERR_UNDECLARED_ENTITY) &&
> ++ (ctxt->lastError.code != XML_WAR_UNDECLARED_ENTITY)) ||
> ++ (ctxt->nbentities <= 10000))
> ++ return (0);
> + }
> + xmlFatalErr(ctxt, XML_ERR_ENTITY_LOOP, NULL);
> + return (1);
> +@@ -2589,6 +2615,7 @@ xmlParserHandlePEReference(xmlParserCtxtPtr ctxt) {
> + name, NULL);
> + ctxt->valid = 0;
> + }
> ++ xmlParserEntityCheck(ctxt, 0, NULL, 0);
> + } else if (ctxt->input->free != deallocblankswrapper) {
> + input = xmlNewBlanksWrapperInputStream(ctxt, entity);
> + if (xmlPushInput(ctxt, input) < 0) @@ -2759,6 +2786,7 @@
> +xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len,
> + if ((ctxt->lastError.code == XML_ERR_ENTITY_LOOP) ||
> + (ctxt->lastError.code == XML_ERR_INTERNAL_ERROR))
> + goto int_error;
> ++ xmlParserEntityCheck(ctxt, 0, ent, 0);
> + if (ent != NULL)
> + ctxt->nbentities += ent->checked / 2;
> + if ((ent != NULL) &&
> +@@ -2810,6 +2838,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len,
> + ent = xmlParseStringPEReference(ctxt, &str);
> + if (ctxt->lastError.code == XML_ERR_ENTITY_LOOP)
> + goto int_error;
> ++ xmlParserEntityCheck(ctxt, 0, ent, 0);
> + if (ent != NULL)
> + ctxt->nbentities += ent->checked / 2;
> + if (ent != NULL) {
> +@@ -7312,6 +7341,7 @@ xmlParseReference(xmlParserCtxtPtr ctxt) {
> + (ret != XML_WAR_UNDECLARED_ENTITY)) {
> + xmlFatalErrMsgStr(ctxt, XML_ERR_UNDECLARED_ENTITY,
> + "Entity '%s' failed to parse\n", ent->name);
> ++ xmlParserEntityCheck(ctxt, 0, ent, 0);
> + } else if (list != NULL) {
> + xmlFreeNodeList(list);
> + list = NULL;
> +@@ -7418,7 +7448,7 @@ xmlParseReference(xmlParserCtxtPtr ctxt) {
> + /*
> + * We are copying here, make sure there is no abuse
> + */
> +- ctxt->sizeentcopy += ent->length;
> ++ ctxt->sizeentcopy += ent->length + 5;
> + if (xmlParserEntityCheck(ctxt, 0, ent, ctxt->sizeentcopy))
> + return;
> +
> +@@ -7466,7 +7496,7 @@ xmlParseReference(xmlParserCtxtPtr ctxt) {
> + /*
> + * We are copying here, make sure there is no abuse
> + */
> +- ctxt->sizeentcopy += ent->length;
> ++ ctxt->sizeentcopy += ent->length + 5;
> + if (xmlParserEntityCheck(ctxt, 0, ent, ctxt->sizeentcopy))
> + return;
> +
> +@@ -7652,6 +7682,7 @@ xmlParseEntityRef(xmlParserCtxtPtr ctxt) {
> + ctxt->sax->reference(ctxt->userData, name);
> + }
> + }
> ++ xmlParserEntityCheck(ctxt, 0, ent, 0);
> + ctxt->valid = 0;
> + }
> +
> +@@ -7845,6 +7876,7 @@ xmlParseStringEntityRef(xmlParserCtxtPtr ctxt, const xmlChar ** str) {
> + "Entity '%s' not defined\n",
> + name);
> + }
> ++ xmlParserEntityCheck(ctxt, 0, ent, 0);
> + /* TODO ? check regressions ctxt->valid = 0; */
> + }
> +
> +@@ -8004,6 +8036,7 @@ xmlParsePEReference(xmlParserCtxtPtr ctxt)
> + name, NULL);
> + ctxt->valid = 0;
> + }
> ++ xmlParserEntityCheck(ctxt, 0, NULL, 0);
> + } else {
> + /*
> + * Internal checking in case the entity quest barfed @@ -8243,6
> ++8276,7 @@ xmlParseStringPEReference(xmlParserCtxtPtr ctxt, const
> ++xmlChar **str) {
> + name, NULL);
> + ctxt->valid = 0;
> + }
> ++ xmlParserEntityCheck(ctxt, 0, NULL, 0);
> + } else {
> + /*
> + * Internal checking in case the entity quest barfed
> +--
> +cgit v0.10.1
> +
> --
> 1.9.1
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>
More information about the Openembedded-core
mailing list