raptor2: CVE-2017-18926

Related Vulnerabilities: CVE-2017-18926  

Debian Bug report logs - #973889
raptor2: CVE-2017-18926

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 6 Nov 2020 20:42:01 UTC

Severity: grave

Tags: fixed-upstream, patch, security, upstream

Found in version raptor2/2.0.14-1

Fixed in versions raptor2/2.0.14-1.1, raptor2/2.0.14-1.1~deb10u1

Done: Salvatore Bonaccorso <carnil@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Dave Beckett <dajobe@debian.org>:
Bug#973889; Package src:raptor2. (Fri, 06 Nov 2020 20:42:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Dave Beckett <dajobe@debian.org>. (Fri, 06 Nov 2020 20:42:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: raptor2: CVE-2017-18926
Date: Fri, 06 Nov 2020 21:38:19 +0100
Source: raptor2
Version: 2.0.14-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for raptor2.

CVE-2017-18926[0]:
| raptor_xml_writer_start_element_common in raptor_xml_writer.c in
| Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace
| declarations for the XML writer, leading to heap-based buffer
| overflows (sometimes seen in raptor_qname_format_as_xml).


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-18926
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18926
[1] https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1
[2] https://www.openwall.com/lists/oss-security/2017/06/07/1

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Dave Beckett <dajobe@debian.org>:
Bug#973889; Package src:raptor2. (Fri, 06 Nov 2020 21:48:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Dave Beckett <dajobe@debian.org>. (Fri, 06 Nov 2020 21:48:03 GMT) (full text, mbox, link).


Message #10 received at 973889@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: 973889@bugs.debian.org
Subject: raptor2: diff for NMU version 2.0.14-1.1
Date: Fri, 6 Nov 2020 22:45:27 +0100
[Message part 1 (text/plain, inline)]
Control: tags 973889 + patch
Control: tags 973889 + pending

Dear maintainer,

I've prepared an NMU for raptor2 (versioned as 2.0.14-1.1) and
uploaded it to DELAYED/2. Please feel free to tell me if I
should delay it longer.

Regards,
Salvatore
[raptor2-2.0.14-1.1-nmu.diff (text/x-diff, attachment)]
[signature.asc (application/pgp-signature, inline)]

Added tag(s) patch. Request was from Salvatore Bonaccorso <carnil@debian.org> to 973889-submit@bugs.debian.org. (Fri, 06 Nov 2020 21:48:03 GMT) (full text, mbox, link).


Added tag(s) pending. Request was from Salvatore Bonaccorso <carnil@debian.org> to 973889-submit@bugs.debian.org. (Fri, 06 Nov 2020 21:48:03 GMT) (full text, mbox, link).


Added tag(s) fixed-upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Fri, 06 Nov 2020 21:51:02 GMT) (full text, mbox, link).


Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Sun, 08 Nov 2020 22:09:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 08 Nov 2020 22:09:05 GMT) (full text, mbox, link).


Message #21 received at 973889-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 973889-close@bugs.debian.org
Subject: Bug#973889: fixed in raptor2 2.0.14-1.1
Date: Sun, 08 Nov 2020 22:08:07 +0000
Source: raptor2
Source-Version: 2.0.14-1.1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
raptor2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 973889@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated raptor2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 06 Nov 2020 22:08:54 +0100
Source: raptor2
Architecture: source
Version: 2.0.14-1.1
Distribution: unstable
Urgency: medium
Maintainer: Dave Beckett <dajobe@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 973889
Changes:
 raptor2 (2.0.14-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Calcualte max nspace declarations correctly for XML writer
     (CVE-2017-18926) (Closes: #973889)
Checksums-Sha1: 
 2e276272324b042372486984836cea8f6d122440 2276 raptor2_2.0.14-1.1.dsc
 48741dcde17e8b538ca3acd7e520398008072d6f 8332 raptor2_2.0.14-1.1.debian.tar.xz
Checksums-Sha256: 
 bcac8b90839d60276859f7e34333813e1bbb18a80d20f12b4234bbf2cdcbf0c9 2276 raptor2_2.0.14-1.1.dsc
 5efc5514a5cf221b8eb5ed196d4be2b20e16a2152958fe6e219effb066788394 8332 raptor2_2.0.14-1.1.debian.tar.xz
Files: 
 e8373a93cf7fe2394656c379b1d55117 2276 devel optional raptor2_2.0.14-1.1.dsc
 57a01bb70d919c63cc04ee4e2677c5c7 8332 devel optional raptor2_2.0.14-1.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl+lvL1fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EMTAP/3aRfEF8nvBej/4Q9JV/GOoasrJuR8am
s6jCgCJTUAGSB8VLl2ZP6jyeCv2m5LJf4fK7PHLBEO7DclRaJIk6XRexzHTkDa76
Y3P3rqPbG/rJbhnIPI80hPcHkTPqMb/ojfngCSqqodRSbV1YZO4K32360Xl7voga
YO57Gj36RqABDq/MbbPPdgL6p6G8mSpYxOK3abn+xxJgc2QiZY2sEqlPz0F8YxhJ
MuchYQkxte3QTB4SkVwFXyAtQ1XRhyRwd4D0KKSRcuFvQapkDVWeq6qgfWRU+3C9
0Ma/SkzmHuLVS1wnoF6eB/NmUhZbMPIRnWNibfVliXxWTX/pVJ/faKGy8DP6fd1J
1H+Q3Sls4KQMggOl+4MjTBVlE8mGyp55nCL77PxlPRX4BL45J0AKVb6thelH/ETx
80mkCCQY712dsU80ciRDWVEjvZm5qNm/o5qXA8xZjFs0iumGY9WgriN0Lts+/z09
7IwqpGyREMHH3rLIeNKFA8zAmCn91MXEV7muRAgFFRCh4o6A2+NgSvSt1vLevmy2
j7xv1bqLxTNFu5eDj7eUR2B0PfeAvyNNl5o2+9yQquUFdL8fZGgr28elITwL/U9L
Otn7NjmfzukHfZOcIsZNe2G4ZnYXVryVvL3UdkXJMhQ+RkTyIumv9NP4GrHovbsd
awQypTwekycp
=vUrG
-----END PGP SIGNATURE-----




Reply sent to Salvatore Bonaccorso <carnil@debian.org>:
You have taken responsibility. (Fri, 13 Nov 2020 11:06:09 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Fri, 13 Nov 2020 11:06:09 GMT) (full text, mbox, link).


Message #26 received at 973889-close@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 973889-close@bugs.debian.org
Subject: Bug#973889: fixed in raptor2 2.0.14-1.1~deb10u1
Date: Fri, 13 Nov 2020 11:03:33 +0000
Source: raptor2
Source-Version: 2.0.14-1.1~deb10u1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
raptor2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 973889@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated raptor2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 06 Nov 2020 22:46:38 +0100
Source: raptor2
Architecture: source
Version: 2.0.14-1.1~deb10u1
Distribution: buster-security
Urgency: high
Maintainer: Dave Beckett <dajobe@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 973889
Changes:
 raptor2 (2.0.14-1.1~deb10u1) buster-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * Rebuild for buster-security
 .
 raptor2 (2.0.14-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Calcualte max nspace declarations correctly for XML writer
     (CVE-2017-18926) (Closes: #973889)
Checksums-Sha1: 
 7054748d4f99239718a90fad48f571abb627afd6 2308 raptor2_2.0.14-1.1~deb10u1.dsc
 f0dc155ee616aac0e5397dd659519c9d0a262f21 1877454 raptor2_2.0.14.orig.tar.gz
 55bc009e40ed5fe27320245a89ae9e4ee6658a46 8372 raptor2_2.0.14-1.1~deb10u1.debian.tar.xz
Checksums-Sha256: 
 b9d9c09236ac0580c9a1404d61f867fae5519b330c68a0c271a699eb65443153 2308 raptor2_2.0.14-1.1~deb10u1.dsc
 cb447b7c684cbe60f1266d622691fd20fdcf7b91f4a470c6de5fc8e8961df1b2 1877454 raptor2_2.0.14.orig.tar.gz
 b70ff4ad71f3e440eb7268d2bdcef6d6ae16b2b35990d9937b5bfb622f0fbd17 8372 raptor2_2.0.14-1.1~deb10u1.debian.tar.xz
Files: 
 f6da6287ef6fdcc374689f5a0e0f470e 2308 devel optional raptor2_2.0.14-1.1~deb10u1.dsc
 d3e0b43866197a5367b781b25510f728 1877454 devel optional raptor2_2.0.14.orig.tar.gz
 eb064a4d4035760e6330dc283a56ab74 8372 devel optional raptor2_2.0.14-1.1~deb10u1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=JLE3
-----END PGP SIGNATURE-----




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Nov 16 09:50:11 2020; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.