{"id":"CVE-2018-20843","details":"In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).","modified":"2026-04-11T14:54:39.077762Z","published":"2019-06-24T17:15:09.980Z","related":["ALSA-2020:4846","MGASA-2019-0274","SUSE-SU-2019:1834-1","SUSE-SU-2019:1835-1","openSUSE-SU-2019:1777-1","openSUSE-SU-2024:10748-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4040-1/"},{"type":"ADVISORY","url":"https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Jun/39"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190703-0001/"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-11"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201911-08"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K51011533"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4040-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4472"},{"type":"REPORT","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://github.com/libexpat/libexpat/issues/186"},{"type":"FIX","url":"https://github.com/libexpat/libexpat/pull/262"},{"type":"FIX","url":"https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libexpat/libexpat","events":[{"introduced":"0"},{"fixed":"d3b78b42a2dcdea98e22625cfff67a49d47e6025"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.2.7"}]}}],"versions":["REC1_0","R_1_95_0","R_1_95_2","R_1_95_3","R_1_95_4","R_1_95_5","R_1_95_6","R_1_95_7","R_1_95_8","R_2_0_0","R_2_0_1","R_2_1_0","R_2_1_1","R_2_2_0","R_2_2_1","R_2_2_2","R_2_2_3","R_2_2_4","R_2_2_5","R_2_2_6","V1990307","V19981122","V19981231","V19990109","V19990425","V19990626","V19990709","V19990728","V19991013","V1_0","V1_1","V20000512","beta2","beta3","beta4","jclark-orig","libexpat-alpha-1","sourceforge_init","start"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","source":"https://github.com/libexpat/libexpat/commit/d3b78b42a2dcdea98e22625cfff67a49d47e6025","digest":{"function_hash":"10718674393994758979083102855553023681","length":670},"deprecated":false,"signature_version":"v1","target":{"file":"expat/tests/runtests.c","function":"START_TEST"},"id":"CVE-2018-20843-74406d59"},{"signature_type":"Line","source":"https://github.com/libexpat/libexpat/commit/d3b78b42a2dcdea98e22625cfff67a49d47e6025","digest":{"threshold":0.9,"line_hashes":["70970158302216444732948686873374648009","197734145770944038326200234670765972062","333002349092091346504095730741649465004","132190683235044997527211951942674695301"]},"deprecated":false,"signature_version":"v1","target":{"file":"expat/tests/runtests.c"},"id":"CVE-2018-20843-ee80e572"}],"vanir_signatures_modified":"2026-04-11T14:54:39Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20843.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"5.7"},{"last_affected":"5.7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.5.4"}]},{"events":[{"introduced":"0"},{"last_affected":"8.5.5"}]},{"events":[{"introduced":"0"},{"fixed":"8.15.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}