From oss-security mailing list: Changes in Expat 2.1.0beta: #2895533: CVE-2012-1147 - Resource leak in readfilemap.c. http://mail.python.org/pipermail/expat-bugs/2009-November/002858.html http://sourceforge.net/tracker/?func=detail&aid=2895533&group_id=10127&atid=110127 https://bugzilla.redhat.com/show_bug.cgi?id=801634 #2958794: CVE-2012-1148 - Memory leak in poolGrow. http://mail.python.org/pipermail/expat-bugs/2010-February/002870.html http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=801648 #3496608: CVE-2012-0876 - Hash DOS attack. http://blog.gmane.org/gmane.text.xml.expat.bugs/month=20120301 http://sourceforge.net/tracker/?func=detail&atid=110127&aid=3496608&group_id=10127 https://bugzilla.redhat.com/show_bug.cgi?id=786617
expat-2.1.0_beta2 now in CVS but it's without KEYWORDS and I'm asking bonsaikitten and/or flameeyes for a tinderbox run before adding KEYWORDS so stay tuned...
(In reply to comment #1) > expat-2.1.0_beta2 now in CVS but it's without KEYWORDS and I'm asking > bonsaikitten and/or flameeyes for a tinderbox run before adding KEYWORDS > > so stay tuned... thanks for rapid bump :)
Created attachment 304725 [details] These reverse deps that must keep working The default profile flags + USE="expat bluetooth webdav" enabled if this list still builds and everything still appears to be working, it should be OK
Since dropping beta3 to ~arch I haven't seen any problems related to expat and/or XML parsing. I think this it's safe to proceed here now with caution. Test (including reverse deps!) & stabilize: =dev-libs/expat-2.1.0_beta3 "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
Stable for HPPA.
amd64 stable
ppc done
ppc64 done
arm stable
2.1.0 was released but I think we can continue with stabilizing 2.1.0_beta3 since it should solve all the sec bugs and get 2.1.0 in 30 days as normal ...
x86 stable
alpha/ia64/m68k/s390/sh/sparc stable
Thanks, everyone. GLSA Vote: yes.
CVE-2012-1148 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1148): Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities. CVE-2012-1147 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1147): readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files. CVE-2012-0876 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0876): The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
YES too, request filed.
This issue was resolved and addressed in GLSA 201209-06 at http://security.gentoo.org/glsa/glsa-201209-06.xml by GLSA coordinator Sean Amoss (ackle).