Out-of-bounds Read The advisory has been revoked - it doesn't affect any version of package coin3  (opens in a new tab)


Threat Intelligence

EPSS
4.77% (93rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2010-COIN3-1031043
  • published4 Sept 2019
  • disclosed4 Sept 2019

Introduced: 4 Sep 2019

CVE-2019-15903  (opens in a new tab)
CWE-125  (opens in a new tab)
CWE-776  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:20.10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream coin3 package and not the coin3 package as distributed by Ubuntu.

In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.

References