Bug 1196168 - (CVE-2022-25313) VUL-0: CVE-2022-25313: expat: Stack exhaustion in build_model() via uncontrolled recursion
(CVE-2022-25313)
VUL-0: CVE-2022-25313: expat: Stack exhaustion in build_model() via uncontrol...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/324167/
CVSSv3.1:SUSE:CVE-2022-25313:6.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-02-18 14:41 UTC by Carlos López
Modified: 2022-07-06 16:20 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-02-18 14:41:36 UTC
CVE-2022-25313

In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion
in build_model via a large nesting depth in the DTD element.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-25313
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://github.com/libexpat/libexpat/pull/558
Comment 1 Carlos López 2022-02-18 14:43:46 UTC
Affected:
 - SUSE:SLE-11:Update
 - SUSE:SLE-12:Update
 - SUSE:SLE-15:Update
 - SUSE:SLE-15-SP4:Update
 - openSUSE:Factory
Comment 2 David Anes 2022-02-20 20:00:15 UTC
Note that version 2.4.5 introduces a regression in the fix for the CVE, so we need to back port this change too from 2.4.6:
- https://github.com/libexpat/libexpat/pull/566

Note from the changelog:
> Fix a regression introduced by the fix for CVE-2022-25313
> in release 2.4.5 that affects applications that (1)
> call function XML_SetElementDeclHandler and (2) are
> parsing XML that contains nested element declarations
> (e.g. "<!ELEMENT junk ((bar|foo|xyz+), zebra*)>").
Comment 3 OBSbugzilla Bot 2022-02-21 09:50:07 UTC
This is an autogenerated message for OBS integration:
This bug (1196168) was mentioned in
https://build.opensuse.org/request/show/956337 Factory / expat
Comment 8 Swamp Workflow Management 2022-03-03 20:18:01 UTC
SUSE-SU-2022:0698-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1196025,1196026,1196168,1196169,1196171
CVE References: CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    expat-2.1.0-21.18.1
SUSE OpenStack Cloud Crowbar 8 (src):    expat-2.1.0-21.18.1
SUSE OpenStack Cloud 9 (src):    expat-2.1.0-21.18.1
SUSE OpenStack Cloud 8 (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server 12-SP5 (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    expat-2.1.0-21.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    expat-2.1.0-21.18.1
HPE Helion Openstack 8 (src):    expat-2.1.0-21.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2022-03-04 14:30:00 UTC
SUSE-SU-2022:0713-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1196025,1196026,1196168,1196169,1196171
CVE References: CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
JIRA References: 
Sources used:
SUSE Manager Server 4.1 (src):    expat-2.2.5-3.15.1
SUSE Manager Retail Branch Server 4.1 (src):    expat-2.2.5-3.15.1
SUSE Manager Proxy 4.1 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server for SAP 15 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Server 15-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Micro 5.1 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise Micro 5.0 (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    expat-2.2.5-3.15.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    expat-2.2.5-3.15.1
SUSE Enterprise Storage 7 (src):    expat-2.2.5-3.15.1
SUSE Enterprise Storage 6 (src):    expat-2.2.5-3.15.1
SUSE CaaS Platform 4.0 (src):    expat-2.2.5-3.15.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-03-04 14:37:35 UTC
SUSE-SU-2022:14903-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1196025,1196026,1196168,1196169,1196171
CVE References: CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    expat-2.0.1-88.42.18.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    expat-2.0.1-88.42.18.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    expat-2.0.1-88.42.18.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    expat-2.0.1-88.42.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2022-03-04 14:41:50 UTC
openSUSE-SU-2022:0713-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1196025,1196026,1196168,1196169,1196171
CVE References: CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    expat-2.2.5-3.15.1
Comment 14 Carlos López 2022-06-09 13:31:16 UTC
Done, closing.
Comment 15 Swamp Workflow Management 2022-07-06 16:20:43 UTC
SUSE-SU-2022:2294-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 1196025,1196026,1196168,1196169,1196171,1196784
CVE References: CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    expat-2.4.4-150400.3.6.9
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    expat-2.4.4-150400.3.6.9

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.