git: 47955717fc53 - main - security/vuxml: Add textproc/expat2 vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Fri, 27 Sep 2024 08:42:36 UTC
The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=47955717fc531fc03406f32b1c6737e9d57dac1b commit 47955717fc531fc03406f32b1c6737e9d57dac1b Author: Fernando Apesteguía <fernape@FreeBSD.org> AuthorDate: 2024-09-27 07:57:42 +0000 Commit: Fernando Apesteguía <fernape@FreeBSD.org> CommitDate: 2024-09-27 08:42:19 +0000 security/vuxml: Add textproc/expat2 vulnerabilities CVE-2024-45490 CVE-2024-45491 CVE-2024-45492 PR: 281738 Reported by: FiLiS <freebsdbugs@filis.org> --- security/vuxml/vuln/2024.xml | 48 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 32e176bfdd69..27d3c4a2b080 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,51 @@ + <vuln vid="ca5f3bbc-7a62-11ef-9533-f875a43e1796"> + <topic>expat -- multiple vulnerabilities</topic> + <affects> + <package> + <name>expat2</name> + <range><lt>2.6.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>libexpat reports:</p> + <blockquote cite="https://github.com/libexpat/libexpat/blob/master/expat/Changes"> + <ul> + <li>CVE-2024-45490: Calling function XML_ParseBuffer with + len < 0 without noticing and then calling XML_GetBuffer + will have XML_ParseBuffer fail to recognize the problem + and XML_GetBuffer corrupt memory. + With the fix, XML_ParseBuffer now complains with error + XML_ERROR_INVALID_ARGUMENT just like sibling XML_Parse + has been doing since Expat 2.2.1, and now documented. + Impact is denial of service to potentially artitrary code + execution.</li> + <li>CVE-2024-45491: Internal function dtdCopy can have an + integer overflow for nDefaultAtts on 32-bit platforms + (where UINT_MAX equals SIZE_MAX). + Impact is denial of service to potentially artitrary code + execution.</li> + <li>CVE-2024-45492: Internal function nextScaffoldPart can + have an integer overflow for m_groupSize on 32-bit + platforms (where UINT_MAX equals SIZE_MAX). + Impact is denial of service to potentially artitrary code + execution.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-45490</cvename> + <cvename>CVE-2024-45491</cvename> + <cvename>CVE-2024-45492</cvename> + <url>https://github.com/libexpat/libexpat/blob/master/expat/Changes</url> + </references> + <dates> + <discovery>2024-09-24</discovery> + <entry>2024-09-24</entry> + </dates> + </vuln> + <vuln vid="4b7ed61f-7bbf-11ef-9369-2cf05da270f3"> <topic>Gitlab -- vulnerabilities</topic> <affects>