|
Message-ID: <4F598EB2.9040504@redhat.com> Date: Thu, 08 Mar 2012 22:01:38 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com Subject: expat 2.1.0beta fixes 5 Denial of Service attacks, CVE's/details inside So expat is releasing an update (2.0.1 -> 2.1.0) which is the first one in a while (which is a testament to the stability and reliability of expat). If you want to help Karl Waclawek (karl@...lawek.net), the author of expat out (and by extension pretty much everyone using Open Source that parses xml using expat which is a lot of stuff), please test the 2.1.0beta and send him feedback (works, doesn't work, etc.). Two of the issues were already assigned CVE's back in 2009, the rest got 2012 because that where we are now. Changes in Expat 2.1.0beta: #2895533: CVE-2012-1147 - Resource leak in readfilemap.c. http://mail.python.org/pipermail/expat-bugs/2009-November/002858.html http://sourceforge.net/tracker/?func=detail&aid=2895533&group_id=10127&atid=110127 https://bugzilla.redhat.com/show_bug.cgi?id=801634 #1990430: CVE-2009-3720 - Parser crash with specially formatted UTF-8 sequences. http://mail.python.org/pipermail/expat-bugs/2009-January/002781.html http://sourceforge.net/tracker/?func=detail&atid=110127&aid=1990430&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=531697 #2894085: CVE-2009-3560 - Buffer over-read and crash in big2_toUtf8(). http://mail.python.org/pipermail/expat-bugs/2009-November/002846.html http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2894085&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=533174 #2958794: CVE-2012-1148 - Memory leak in poolGrow. http://mail.python.org/pipermail/expat-bugs/2010-February/002870.html http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=801648 #3496608: CVE-2012-0876 - Hash DOS attack. http://blog.gmane.org/gmane.text.xml.expat.bugs/month=20120301 http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=786617 -- Kurt Seifried Red Hat Security Response Team (SRT)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.