#
751a8f41 |
| 27-Oct-2022 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.5.0. This fixes CVE-2022-43680. Relevant for OpenBSD are security fixes #616 #649 #650 and bug fixes #612 #645 #613 #654 #616 #652 #653. No library bump necessary. OK tb@
|
#
253fd6bf |
| 22-Feb-2022 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.4.6. This fixes CVE-2022-25235, CVE-2022-25236 CVE-2022-25313, CVE-2022-25314, and CVE-2022-25315. Relevant for OpenBSD are security fixes #558 #559 #560 #561 #562 and bug fixe
Update libexpat to 2.4.6. This fixes CVE-2022-25235, CVE-2022-25236 CVE-2022-25313, CVE-2022-25314, and CVE-2022-25315. Relevant for OpenBSD are security fixes #558 #559 #560 #561 #562 and bug fixes #566. No library bump necessary. OK tb@
show more ...
|
#
08819b41 |
| 26-May-2021 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.4.1. This fixes CVE-2013-0340. Relevant for OpenBSD are security fixes #34 #466 #484 and other changes #467 #473 #483. A new error number in a public header requires a major l
Update libexpat to 2.4.1. This fixes CVE-2013-0340. Relevant for OpenBSD are security fixes #34 #466 #484 and other changes #467 #473 #483. A new error number in a public header requires a major library bump. Two functions have been added to API. OK tb@
show more ...
|
#
28ce3119 |
| 25-Sep-2019 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.2.8. CVE-2019-15903 has been fixed earlier in our tree. Relevant is only bug fix #240. Most of the upstream diff is automated source format change. OK deraadt@
|
#
797786e5 |
| 22-Aug-2018 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.2.6. Relevant for OpenBSD is - Avoid doing arithmetic with NULL pointers in XML_GetBuffer - Fix 2.2.5 regression with suspend-resume while parsing a document like '<root/>' -
Update libexpat to 2.2.6. Relevant for OpenBSD is - Avoid doing arithmetic with NULL pointers in XML_GetBuffer - Fix 2.2.5 regression with suspend-resume while parsing a document like '<root/>' - Address compiler warnings - Fix miscellaneous typos
show more ...
|
#
9b8e2351 |
| 02-Nov-2017 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.2.5. Changes for OpenBSD include a few bug fixes, no library bump needed. OK deraadt@
|
#
2e724bc9 |
| 23-Aug-2017 |
bluhm <bluhm@openbsd.org> |
Update libexpat to 2.2.4. Fix copying partial UTF-8 characters. OK deraadt@
|
#
2feb5d2a |
| 30-Jun-2017 |
bluhm <bluhm@openbsd.org> |
Update libexpat to version 2.2.1 which has some security fixes. - CVE-2017-9233 CVE-2016-9063 CVE-2016-5300 CVE-2016-4472 CVE-2016-0718 CVE-2015-2716 CVE-2015-1283 CVE-2012-6702 CVE-2012-0876 have
Update libexpat to version 2.2.1 which has some security fixes. - CVE-2017-9233 CVE-2016-9063 CVE-2016-5300 CVE-2016-4472 CVE-2016-0718 CVE-2015-2716 CVE-2015-1283 CVE-2012-6702 CVE-2012-0876 have been addressed. Not all of them affect OpenBSD as we had fixes before. - Upstream uses arc4random_buf(3) now. Delete all code for other entropy sources to make sure to compile the correct one. Our library already used arc4random(3) before. - The overflow fixes in rev 1.11 and 1.12 of lib/xmlparse.c have been commited upstream in a different way. Use the upstream code to make maintenance easier. - Although it should be ABI compatible, there is a new global symbol align_limit_to_full_utf8_characters. As it is in lib/internal.h, add a Symbols.map to restrict the export. Do not bump the shared library version. - Use the internal expat's siphash.h. ports build ajacoutot@; move ahead deraadt@
show more ...
|
#
695f0d7b |
| 09-May-2016 |
rpointel <rpointel@openbsd.org> |
update libexpat to 2.1.1. ok deraadt@ (thanks to sebastian[@]pipping[.]org for information).
|
#
b26ab0f8 |
| 30-Aug-2007 |
matthieu <matthieu@openbsd.org> |
Update to expat 2.0.1. ok deraadt@
|
#
7d36914f |
| 06-May-2006 |
alek <alek@openbsd.org> |
Update to 2.0.0; keep our local changes
ok espie@, djm@
|
#
1a3ddf8c |
| 22-Sep-2004 |
espie <espie@openbsd.org> |
libexpat: a simple xml parser library, used by X11 and some ports.
|