{
  "schema_version": "1.6.2",
  "id": "MGASA-2024-0294",
  "published": "2024-09-11T20:42:44Z",
  "modified": "2024-09-11T20:20:21Z",
  "summary": "Updated expat packages fix security vulnerabilities",
  "details": "An issue was discovered in libexpat before 2.6.3. xmlparse.c does not\nreject a negative length for XML_ParseBuffer. (CVE-2024-45490)\nAn issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c\ncan have an integer overflow for nDefaultAtts on 32-bit platforms (where\nUINT_MAX equals SIZE_MAX). (CVE-2024-45491)\nAn issue was discovered in libexpat before 2.6.3. nextScaffoldPart in\nxmlparse.c can have an integer overflow for m_groupSize on 32-bit\nplatforms (where UINT_MAX equals SIZE_MAX). (CVE-2024-45492)\n",
  "related": [
    "CVE-2024-45490",
    "CVE-2024-45491",
    "CVE-2024-45492"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2024-0294.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=33547"
    },
    {
      "type": "REPORT",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2024&m=slackware-security.351556"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:9",
        "name": "expat",
        "purl": "pkg:rpm/mageia/expat?arch=source&distro=mageia-9"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "2.6.3-1.mga9"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
