------------------------------------------------------------------------- Debian LTS Advisory DLA-3893-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Guilhem Moulin September 19, 2024 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : expat Version : 2.2.10-2+deb11u6 CVE ID : CVE-2023-52425 CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 Debian Bug : 1063238 1080149 1080150 1080152 Multiple vulnerabilities were found in expat, an XML parsing C library, which could lead to Denial of Service, memory corruption or arbitrary code execution. CVE-2023-52425 Snild Dolkow discovered that when parsing a large token that requires multiple buffer fills to complete, expat has to re-parse the token from start multiple times, which could lead to Denial of Service via resource exhaustion. CVE-2024-45490 TaiYou discovered that xmlparse.c does not reject a negative length for XML_ParseBuffer(), which may cause memory corruption or code execution. CVE-2024-45491 TaiYou discovered that xmlparse.c has an integer overflow for `nDefaultAtts` on 32-bit platforms, which may cause denial of service or code execution. CVE-2024-45492 TaiYou discovered that xmlparse.c has an integer overflow for `m_groupSize` on 32-bit platforms, which may cause denial of service or code execution. For Debian 11 bullseye, these problems have been fixed in version 2.2.10-2+deb11u6. We recommend that you upgrade your expat packages. For the detailed security status of expat please refer to its security tracker page at: https://security-tracker.debian.org/tracker/expat Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature