| Name | CVE-2018-20843 |
| Description | In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks). |
| Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-1839-1, DSA-4472-1 |
| Debian Bugs | 931031 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| expat (PTS) | bullseye (security), bullseye | 2.2.10-2+deb11u5 | fixed |
| bookworm | 2.5.0-1 | fixed | |
| trixie, sid | 2.6.2-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| expat | source | jessie | 2.1.0-6+deb8u5 | DLA-1839-1 | ||
| expat | source | stretch | 2.2.0-2+deb9u2 | DSA-4472-1 | ||
| expat | source | (unstable) | 2.2.6-2 | 931031 |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226
https://github.com/libexpat/libexpat/issues/186
https://github.com/libexpat/libexpat/pull/262
https://github.com/libexpat/libexpat/commit/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6