[manjaro-security] [arch-security] [ASA-201707-27] lib32-expat: denial of service

Remi Gacogne rgacogne at archlinux.org
Thu Jul 27 11:01:55 CEST 2017


Arch Linux Security Advisory ASA-201707-27
==========================================

Severity: Medium
Date    : 2017-07-26
CVE-ID  : CVE-2016-9063 CVE-2017-9233
Package : lib32-expat
Type    : denial of service
Remote  : Yes
Link    : https://security.archlinux.org/AVG-305

Summary
=======

The package lib32-expat before version 2.2.2-1 is vulnerable to denial
of service.

Resolution
==========

Upgrade to 2.2.2-1.

# pacman -Syu "lib32-expat>=2.2.2-1"

The problems have been fixed upstream in version 2.2.2.

Workaround
==========

None.

Description
===========

- CVE-2016-9063 (denial of service)

An integer overflow vulnerability has been discovered during the
parsing of XML using the Expat library.

- CVE-2017-9233 (denial of service)

An external entity infinite loop issue has been found in Expat < 2.2.1,
leading to a denial of service.

Impact
======

An attacker can cause a denial of service in an application using
lib32-expat by sending a crafted XML payload.

References
==========

https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20
https://libexpat.github.io/doc/cve-2017-9233/
https://security.archlinux.org/CVE-2016-9063
https://security.archlinux.org/CVE-2017-9233

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20170727/07bf5abc/attachment.sig>


More information about the manjaro-security mailing list