Описание
Security update for expat
This update for expat fixes the following issues:
expat was updated to version 2.7.1:
-
Bug fixes:
-
Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are:
- XML_GetCurrentByteCount - XML_GetCurrentByteIndex - XML_GetCurrentColumnNumber - XML_GetCurrentLineNumber - XML_GetInputContext
-
-
Other changes:
- Fix printf format specifiers for 32bit Emscripten
- docs: Promote OpenSSF Best Practices self-certification
- tests/benchmark: Resolve mistaken double close
- Address compiler warnings
- Version info bumped from 11:1:10 (libexpat*.so.1.10.1) to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/ for what these numbers do
Version update to 2.7.0 (CVE-2024-8176, bsc#1239618, jsc#PED-12507)
- Security fixes:
-
CVE-2024-8176 -- Fix crash from chaining a large number of entities caused by stack overflow by resolving use of recursion, for all three uses of entities: - general entities in character data ('&g1;') - general entities in attribute values ('') - parameter entities ('%p1;')
Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size.
- Other changes:
-
docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4
-
docs: Document need for C++11 compiler for use from C++
-
Address Cppcheck warnings
-
Mass-migrate links from http:// to https://
-
Document changes since the previous release
-
Version info bumped from 11:0:10 (libexpat*.so.1.10.0) to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/ for what these numbers do
-
Список пакетов
Container bci/bci-base-fips:latest
Container bci/bci-init:latest
Container bci/bci-sle15-kernel-module-devel:latest
Container bci/gcc:latest
Container bci/golang:1.24-openssl
Container bci/golang:latest
Container bci/kiwi:latest
Container bci/openjdk-devel:17
Container bci/openjdk-devel:latest
Container bci/openjdk:17
Container bci/openjdk:latest
Container bci/php-apache:latest
Container bci/ruby:2
Container bci/ruby:latest
Container suse/git:latest
Container suse/kea:latest
Container suse/kiosk/firefox-esr:latest
Container suse/kiosk/pulseaudio:latest
Container suse/kiosk/xorg-client:latest
Container suse/kiosk/xorg:latest
Container suse/mariadb:latest
Container suse/nginx:latest
Container suse/registry:latest
Container suse/samba-toolbox:latest
SUSE Linux Enterprise Module for Basesystem 15 SP7
Ссылки
- Link for SUSE-SU-2025:03239-1
- E-Mail link for SUSE-SU-2025:03239-1
- SUSE Security Ratings
- SUSE Bug 1239618
- SUSE CVE CVE-2024-8176 page
Описание
A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
Затронутые продукты
Ссылки
- CVE-2024-8176
- SUSE Bug 1239618