Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-45492

Опубликовано: 30 авг. 2024
Источник: debian
EPSS Низкий

Описание

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
expatfixed2.6.2-2package
libxmltokremovedpackage
libxmltokignoredbookwormpackage

Примечания

  • https://github.com/libexpat/libexpat/pull/892

  • https://github.com/libexpat/libexpat/issues/889

  • https://github.com/libexpat/libexpat/commit/29ef43a0bab633b41e71dd6d900fff5f6b3ad5e4 (R_2_6_3)

EPSS

Процентиль: 39%
0.00167
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
10 месяцев назад

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

CVSS3: 6.2
redhat
10 месяцев назад

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

CVSS3: 9.8
nvd
10 месяцев назад

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

CVSS3: 9.8
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 7.3
github
10 месяцев назад

An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).

EPSS

Процентиль: 39%
0.00167
Низкий