History log of /openbsd/lib/libexpat/examples/elements.c (Results 1 – 12 of 12)
Revision Date Author Comments
# 751a8f41 27-Oct-2022 bluhm <bluhm@openbsd.org>

Update libexpat to 2.5.0. This fixes CVE-2022-43680. Relevant for
OpenBSD are security fixes #616 #649 #650 and bug fixes #612 #645
#613 #654 #616 #652 #653. No library bump necessary.
OK tb@


# 253fd6bf 22-Feb-2022 bluhm <bluhm@openbsd.org>

Update libexpat to 2.4.6. This fixes CVE-2022-25235, CVE-2022-25236
CVE-2022-25313, CVE-2022-25314, and CVE-2022-25315. Relevant for
OpenBSD are security fixes #558 #559 #560 #561 #562 and bug fixe

Update libexpat to 2.4.6. This fixes CVE-2022-25235, CVE-2022-25236
CVE-2022-25313, CVE-2022-25314, and CVE-2022-25315. Relevant for
OpenBSD are security fixes #558 #559 #560 #561 #562 and bug fixes
#566. No library bump necessary.
OK tb@

show more ...


# 08819b41 26-May-2021 bluhm <bluhm@openbsd.org>

Update libexpat to 2.4.1. This fixes CVE-2013-0340. Relevant for
OpenBSD are security fixes #34 #466 #484 and other changes #467
#473 #483. A new error number in a public header requires a major
l

Update libexpat to 2.4.1. This fixes CVE-2013-0340. Relevant for
OpenBSD are security fixes #34 #466 #484 and other changes #467
#473 #483. A new error number in a public header requires a major
library bump. Two functions have been added to API.
OK tb@

show more ...


# 28ce3119 25-Sep-2019 bluhm <bluhm@openbsd.org>

Update libexpat to 2.2.8. CVE-2019-15903 has been fixed earlier
in our tree. Relevant is only bug fix #240. Most of the upstream
diff is automated source format change.
OK deraadt@


# 797786e5 22-Aug-2018 bluhm <bluhm@openbsd.org>

Update libexpat to 2.2.6. Relevant for OpenBSD is
- Avoid doing arithmetic with NULL pointers in XML_GetBuffer
- Fix 2.2.5 regression with suspend-resume while parsing
a document like '<root/>'
-

Update libexpat to 2.2.6. Relevant for OpenBSD is
- Avoid doing arithmetic with NULL pointers in XML_GetBuffer
- Fix 2.2.5 regression with suspend-resume while parsing
a document like '<root/>'
- Address compiler warnings
- Fix miscellaneous typos

show more ...


# 9b8e2351 02-Nov-2017 bluhm <bluhm@openbsd.org>

Update libexpat to 2.2.5. Changes for OpenBSD include a few bug
fixes, no library bump needed.
OK deraadt@


# 2e724bc9 23-Aug-2017 bluhm <bluhm@openbsd.org>

Update libexpat to 2.2.4. Fix copying partial UTF-8 characters.
OK deraadt@


# 2feb5d2a 30-Jun-2017 bluhm <bluhm@openbsd.org>

Update libexpat to version 2.2.1 which has some security fixes.
- CVE-2017-9233 CVE-2016-9063 CVE-2016-5300 CVE-2016-4472 CVE-2016-0718
CVE-2015-2716 CVE-2015-1283 CVE-2012-6702 CVE-2012-0876 have

Update libexpat to version 2.2.1 which has some security fixes.
- CVE-2017-9233 CVE-2016-9063 CVE-2016-5300 CVE-2016-4472 CVE-2016-0718
CVE-2015-2716 CVE-2015-1283 CVE-2012-6702 CVE-2012-0876 have been
addressed. Not all of them affect OpenBSD as we had fixes before.
- Upstream uses arc4random_buf(3) now. Delete all code for other
entropy sources to make sure to compile the correct one. Our
library already used arc4random(3) before.
- The overflow fixes in rev 1.11 and 1.12 of lib/xmlparse.c
have been commited upstream in a different way. Use the upstream
code to make maintenance easier.
- Although it should be ABI compatible, there is a new global
symbol align_limit_to_full_utf8_characters. As it is in
lib/internal.h, add a Symbols.map to restrict the export. Do not
bump the shared library version.
- Use the internal expat's siphash.h.
ports build ajacoutot@; move ahead deraadt@

show more ...


# 695f0d7b 09-May-2016 rpointel <rpointel@openbsd.org>

update libexpat to 2.1.1.
ok deraadt@ (thanks to sebastian[@]pipping[.]org for information).


# b26ab0f8 30-Aug-2007 matthieu <matthieu@openbsd.org>

Update to expat 2.0.1. ok deraadt@


# 7d36914f 06-May-2006 alek <alek@openbsd.org>

Update to 2.0.0; keep our local changes

ok espie@, djm@


# 1a3ddf8c 22-Sep-2004 espie <espie@openbsd.org>

libexpat: a simple xml parser library, used by X11 and some ports.