-------------------------------------------------------------------------
Debian LTS Advisory DLA-3893-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Guilhem Moulin
September 19, 2024                            https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : expat
Version        : 2.2.10-2+deb11u6
CVE ID         : CVE-2023-52425 CVE-2024-45490 CVE-2024-45491 CVE-2024-45492
Debian Bug     : 1063238 1080149 1080150 1080152

Multiple vulnerabilities were found in expat, an XML parsing C library,
which could lead to Denial of Service, memory corruption or arbitrary
code execution.

CVE-2023-52425

    Snild Dolkow discovered that when parsing a large token that
    requires multiple buffer fills to complete, expat has to re-parse
    the token from start multiple times, which could lead to Denial of
    Service via resource exhaustion.

CVE-2024-45490

    TaiYou discovered that xmlparse.c does not reject a negative length
    for XML_ParseBuffer(), which may cause memory corruption or code
    execution.

CVE-2024-45491

    TaiYou discovered that xmlparse.c has an integer overflow for
    `nDefaultAtts` on 32-bit platforms, which may cause denial of
    service or code execution.

CVE-2024-45492

    TaiYou discovered that xmlparse.c has an integer overflow for
    `m_groupSize` on 32-bit platforms, which may cause denial of service
    or code execution.

For Debian 11 bullseye, these problems have been fixed in version
2.2.10-2+deb11u6.

We recommend that you upgrade your expat packages.

For the detailed security status of expat please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/expat

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3893-1: expat Security Advisory Updates

September 19, 2024
Multiple vulnerabilities were found in expat, an XML parsing C library, which could lead to Denial of Service, memory corruption or arbitrary code execution

Summary

CVE-2023-52425

Snild Dolkow discovered that when parsing a large token that
requires multiple buffer fills to complete, expat has to re-parse
the token from start multiple times, which could lead to Denial of
Service via resource exhaustion.

CVE-2024-45490

TaiYou discovered that xmlparse.c does not reject a negative length
for XML_ParseBuffer(), which may cause memory corruption or code
execution.

CVE-2024-45491

TaiYou discovered that xmlparse.c has an integer overflow for
`nDefaultAtts` on 32-bit platforms, which may cause denial of
service or code execution.

CVE-2024-45492

TaiYou discovered that xmlparse.c has an integer overflow for
`m_groupSize` on 32-bit platforms, which may cause denial of service
or code execution.

For Debian 11 bullseye, these problems have been fixed in version
2.2.10-2+deb11u6.

We recommend that you upgrade your expat packages.

For the detailed security status of expat please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/expat

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : expat
Version : 2.2.10-2+deb11u6
CVE ID : CVE-2023-52425 CVE-2024-45490 CVE-2024-45491 CVE-2024-45492
Debian Bug : 1063238 1080149 1080150 1080152

Related News