New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 781518 link

Starred by 1 user

Issue metadata

Status: Fixed
Owner:
not working at Google anymore
Closed: Nov 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 1
Type: Bug-Security



Sign in to add a comment

Chromium: Vulnerability reported in expat

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Nov 4 2017

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: expat
Package Version: [cpe:/a:libexpat:expat:2.1.0]

Advisory: CVE-2012-6702
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2012-6702
  CVSS severity score: 4.3/10.0
  Confidence: high
  Description:

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
Advisory: CVE-2016-0718
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-0718
  CVSS severity score: 7.5/10.0
  Confidence: high
  Description:

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Advisory: CVE-2016-5300
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-5300
  CVSS severity score: 7.8/10.0
  Confidence: high
  Description:

The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.


 
 Issue 781517  has been merged into this issue.
 Issue 735752  has us rolled to expat 2.2.3 for M63. From my reading of https://github.com/libexpat/libexpat/blob/master/expat/Changes, I believe all of these are addressed.
Cc: dominicc@chromium.org
Components: Blink>XML
Owner: nick@chromium.org
Status: Assigned (was: Unconfirmed)
nick, dominicc, can you please confirm comment #2?

Comment 4 by est...@chromium.org, Nov 10 2017

Friendly ping!

Comment 5 by mmoroz@chromium.org, Nov 14 2017

Cc: -dominicc@chromium.org
Status: Fixed (was: Assigned)
Dominicc@ is not at google anymore. I double-checked that version 2.2.3 has all the fixes.
Project Member

Comment 6 by sheriffbot@chromium.org, Nov 15 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 7 by sheriffbot@chromium.org, Feb 21 2018

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment