{"id":"CVE-2012-1148","details":"Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.","modified":"2026-04-10T03:42:15.025831Z","published":"2012-07-03T19:55:02Z","related":["openSUSE-SU-2024:10077-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2012-0731.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0062.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/49504"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51024"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51040"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2525"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:041"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1527-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1613-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1613-2"},{"type":"FIX","url":"http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html"},{"type":"WEB","url":"http://sourceforge.net/projects/expat/files/expat/2.1.0/"},{"type":"WEB","url":"http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127"},{"type":"WEB","url":"http://www.securityfocus.com/bid/52379"},{"type":"WEB","url":"http://www.securitytracker.com/id/1034344"},{"type":"WEB","url":"https://support.apple.com/HT205637"}],"schema_version":"1.7.5"}