It was discovered that Expat could crash due to stack overflow when processing XML documents with deeply nested entity references. If a user or automated system were tricked into processing specially crafted XML input, an attacker could use this issue to cause a denial of service.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.4.7-1ubuntu0.6", "binary_name": "expat" }, { "binary_version": "2.4.7-1ubuntu0.6", "binary_name": "expat-dbgsym" }, { "binary_version": "2.4.7-1ubuntu0.6", "binary_name": "libexpat1" }, { "binary_version": "2.4.7-1ubuntu0.6", "binary_name": "libexpat1-dbgsym" }, { "binary_version": "2.4.7-1ubuntu0.6", "binary_name": "libexpat1-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.6.2-2ubuntu0.2", "binary_name": "expat" }, { "binary_version": "2.6.2-2ubuntu0.2", "binary_name": "expat-dbgsym" }, { "binary_version": "2.6.2-2ubuntu0.2", "binary_name": "libexpat1" }, { "binary_version": "2.6.2-2ubuntu0.2", "binary_name": "libexpat1-dbgsym" }, { "binary_version": "2.6.2-2ubuntu0.2", "binary_name": "libexpat1-dev" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.6.1-2ubuntu0.3", "binary_name": "expat" }, { "binary_version": "2.6.1-2ubuntu0.3", "binary_name": "expat-dbgsym" }, { "binary_version": "2.6.1-2ubuntu0.3", "binary_name": "libexpat1" }, { "binary_version": "2.6.1-2ubuntu0.3", "binary_name": "libexpat1-dbgsym" }, { "binary_version": "2.6.1-2ubuntu0.3", "binary_name": "libexpat1-dev" } ] }