expat: CVE-2013-0340

Related Vulnerabilities: CVE-2013-0340  

Debian Bug report logs - #1001864
expat: CVE-2013-0340

version graph

Package: expat; Maintainer for expat is Laszlo Boszormenyi (GCS) <gcs@debian.org>; Source for expat is src:expat (PTS, buildd, popcon).

Reported by: "Devalla, Manoj Raj" <ManojRaj.Devalla@Cerner.com>

Date: Fri, 17 Dec 2021 22:36:02 UTC

Severity: important

Tags: security, upstream

Found in version expat/2.2.10-2

Fixed in version expat/2.4.1-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Laszlo Boszormenyi (GCS) <gcs@debian.org>:
Bug#1001864; Package expat. (Fri, 17 Dec 2021 22:36:04 GMT) (full text, mbox, link).


Acknowledgement sent to "Devalla, Manoj Raj" <ManojRaj.Devalla@Cerner.com>:
New Bug report received and forwarded. Copy sent to Laszlo Boszormenyi (GCS) <gcs@debian.org>.

Your message tried to set a usertag, but didn't have a valid user set ('"Devalla' isn't valid)

(Fri, 17 Dec 2021 22:36:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Devalla, Manoj Raj" <ManojRaj.Devalla@Cerner.com>
To: "submit@bugs.debian.org" <submit@bugs.debian.org>
Subject: expat: CVE-2013-0340
Date: Fri, 17 Dec 2021 22:33:32 +0000
[Message part 1 (text/plain, inline)]
Package: expat
Version: 2.2.10-2
Severity: important
Tags: security upstream

Hi,


The following vulnerability was published for expat.



CVE-2013-0340[0]:

| expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of

| service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because

| expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be

| REJECTed, and each affected application would need its own CVE.



If you fix the vulnerability please also make sure to include the

CVE (Common Vulnerabilities & Exposures) id in your changelog entry.



Current OS: Debian GNU/Linux 11



For further information see:



[0] https://nvd.nist.gov/vuln/detail/CVE-2013-0340



Please adjust the affected versions in the BTS as needed.



Regards,

Raj



CONFIDENTIALITY NOTICE This message and any included attachments are from Cerner Corporation and are intended only for the addressee. The information contained in this message is confidential and may constitute inside or non-public information under international, federal, or state securities laws. Unauthorized forwarding, printing, copying, distribution, or use of such information is strictly prohibited and may be unlawful. If you are not the addressee, please promptly delete this message and notify the sender of the delivery error by e-mail or you may call Cerner's corporate offices in Kansas City, Missouri, U.S.A at (+1) (816)221-1024.
[Message part 2 (text/html, inline)]

Marked as fixed in versions expat/2.4.1-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 18 Dec 2021 08:57:02 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sat, 18 Dec 2021 08:57:03 GMT) (full text, mbox, link).


Notification sent to "Devalla, Manoj Raj" <ManojRaj.Devalla@Cerner.com>:
Bug acknowledged by developer. (Sat, 18 Dec 2021 08:57:04 GMT) (full text, mbox, link).


Message sent on to "Devalla, Manoj Raj" <ManojRaj.Devalla@Cerner.com>:
Bug#1001864. (Sat, 18 Dec 2021 08:57:05 GMT) (full text, mbox, link).


Message #14 received at 1001864-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 1001864-submitter@bugs.debian.org
Subject: closing 1001864
Date: Sat, 18 Dec 2021 09:52:39 +0100
close 1001864 2.4.1-1
thanks




Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Dec 18 14:39:58 2021; Machine Name: bembo

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.