Package "expat"
Name: |
expat
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- XML parsing C library - runtime library
- XML parsing C library - development kit
|
Latest version: |
2.4.7-1ubuntu0.6 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
main |
Links
Other versions of "expat" in Jammy
Packages in group
Deleted packages are displayed in grey.
Changelog
expat (2.4.7-1ubuntu0.6) jammy-security; urgency=medium
* SECURITY UPDATE: denial of service via stack overflow
- debian/patches/CVE-2024-8176-pre.patch: Remove XML_DTD guards
before is_param accesses
- debian/patches/CVE-2024-8176-test-pre-1.patch: minicheck: Add
fail_unless() macro
- debian/patches/CVE-2024-8176-test-pre-2.patch: tests: Rename
_fail_unless to _assert_true for clarity
- debian/patches/CVE-2024-8176-test-pre-3.patch: minicheck: Add
simple subtest support
- debian/patches/CVE-2024-8176-1.patch: Resolve the recursion during
entity processing to prevent stack overflow
- debian/patches/CVE-2024-8176-2.patch: Stop updating event pointer
on exit for reentry
- CVE-2024-8176
-- Vyom Yadav <email address hidden> Mon, 07 Apr 2025 20:07:15 +0530
|
Source diff to previous version |
CVE-2024-8176 |
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an |
|
expat (2.4.7-1ubuntu0.5) jammy-security; urgency=medium
* SECURITY UPDATE: denial-of-service via XML_ResumeParser
- debian/patches/CVE-2024-50602-1.patch: Make function XML_StopParser of
expat/lib/xmlparse.c refuse to stop/suspend an unstarted parser
- debian/patches/CVE-2024-50602-2.patch: Add XML_PARSING case to parser
state in function XML_StopParser of expat/lib/xmlparse.c
- debian/patches/CVE-2024-50602-3.patch: Add tests for CVE-2024-50602 to
expat/tests/runtests.c
- CVE-2024-50602
-- Nicolas Campuzano Jimenez <email address hidden> Sun, 01 Dec 2024 15:51:42 -0500
|
Source diff to previous version |
CVE-2024-50602 |
An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an un |
|
expat (2.4.7-1ubuntu0.4) jammy-security; urgency=medium
* SECURITY UPDATE: invalid input length
- CVE-2024-45490-*.patch: adds a check to the XML_ParseBuffer function of
expat/lib/xmlparse.c to identify and error out if a negative length is
provided.
- CVE-2024-45490
* SECURITY UPDATE: integer overflow
- CVE-2024-45491.patch: adds a check to the dtdCopy function of
expat/lib/xmlparse.c to detect and prevent an integer overflow.
- CVE-2024-45491
* SECURITY UPDATE: integer overflow
- CVE-2024-45492.patch: adds a check to the nextScaffoldPart function of
expat/lib/xmlparse.c to detect and prevent an integer overflow.
- CVE-2024-45492
-- Ian Constantin <email address hidden> Tue, 10 Sep 2024 13:17:45 +0300
|
Source diff to previous version |
CVE-2024-45490 |
An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer. |
CVE-2024-45491 |
An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT |
CVE-2024-45492 |
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (wh |
|
expat (2.4.7-1ubuntu0.3) jammy-security; urgency=medium
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2023-52425.patch: Speed up parsing of big tokens.
- CVE-2023-52425
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2024-28757.patch: Detect billion laughs attack with
isolated external parser.
- CVE-2024-28757
-- Fabian Toepfer <email address hidden> Wed, 13 Mar 2024 14:28:54 +0100
|
Source diff to previous version |
CVE-2023-52425 |
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for w |
CVE-2024-28757 |
libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCrea |
|
expat (2.4.7-1ubuntu0.2) jammy-security; urgency=medium
* SECURITY UPDATE: use-after-free
- debian/patches/CVE-2022-43680-1.patch: adds tests to cover
DTD destruction in XML_ExternalEntityParserCreate in
expat/tests/runtests.c.
- debian/patches/CVE-2022-43680-2.patch: fix overeager DTD
destruction in XML_ExternalEntityParserCreate in
expat/lib/xmlparse.c.
- CVE-2022-43680
-- David Fernandez Gonzalez <email address hidden> Fri, 18 Nov 2022 12:21:42 +0100
|
CVE-2022-43680 |
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memo |
|
About
-
Send Feedback to @ubuntu_updates