rpm package
suse/expat&distro=SUSE Linux Enterprise Server 12 SP2
pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-9063 | — | < 2.1.0-21.3.1 | 2.1.0-21.3.1 | Jun 11, 2018 | An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. | ||
| CVE-2017-9233 | Hig | 7.5 | < 2.1.0-21.3.1 | 2.1.0-21.3.1 | Jul 25, 2017 | XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD. | |
| CVE-2016-5300 | Hig | 7.5 | < 2.1.0-20.2 | 2.1.0-20.2 | Jun 16, 2016 | The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for C | |
| CVE-2012-6702 | Med | 5.9 | < 2.1.0-20.2 | 2.1.0-20.2 | Jun 16, 2016 | Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function. |
- CVE-2016-9063Jun 11, 2018affected < 2.1.0-21.3.1fixed 2.1.0-21.3.1
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
- affected < 2.1.0-21.3.1fixed 2.1.0-21.3.1
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- affected < 2.1.0-20.2fixed 2.1.0-20.2
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for C
- affected < 2.1.0-20.2fixed 2.1.0-20.2
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.