Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:03239-1

Опубликовано: 16 сент. 2025
Источник: suse-cvrf

Описание

Security update for expat

This update for expat fixes the following issues:

expat was updated to version 2.7.1:

  • Bug fixes:

    • Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are:

      - XML_GetCurrentByteCount - XML_GetCurrentByteIndex - XML_GetCurrentColumnNumber - XML_GetCurrentLineNumber - XML_GetInputContext
  • Other changes:

    • Fix printf format specifiers for 32bit Emscripten
    • docs: Promote OpenSSF Best Practices self-certification
    • tests/benchmark: Resolve mistaken double close
    • Address compiler warnings
    • Version info bumped from 11:1:10 (libexpat*.so.1.10.1) to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/ for what these numbers do

Version update to 2.7.0 (CVE-2024-8176, bsc#1239618, jsc#PED-12507)

  • Security fixes:
  • CVE-2024-8176 -- Fix crash from chaining a large number of entities caused by stack overflow by resolving use of recursion, for all three uses of entities: - general entities in character data ('&g1;') - general entities in attribute values ('') - parameter entities ('%p1;')

    Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size.

  • Other changes:
    • docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4

    • docs: Document need for C++11 compiler for use from C++

    • Address Cppcheck warnings

    • Mass-migrate links from http:// to https://

    • Document changes since the previous release

    • Version info bumped from 11:0:10 (libexpat*.so.1.10.0) to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/ for what these numbers do

Список пакетов

Container bci/bci-base-fips:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/bci-init:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/bci-sle15-kernel-module-devel:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/gcc:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/golang:1.24-openssl
libexpat1-2.7.1-150700.3.3.1
Container bci/golang:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/kiwi:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/openjdk-devel:17
libexpat1-2.7.1-150700.3.3.1
Container bci/openjdk-devel:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/openjdk:17
libexpat1-2.7.1-150700.3.3.1
Container bci/openjdk:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/php-apache:latest
libexpat1-2.7.1-150700.3.3.1
Container bci/ruby:2
libexpat1-2.7.1-150700.3.3.1
Container bci/ruby:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/git:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/kea:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/kiosk/firefox-esr:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/kiosk/pulseaudio:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/kiosk/xorg-client:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/kiosk/xorg:latest
expat-2.7.1-150700.3.3.1
libexpat1-2.7.1-150700.3.3.1
Container suse/mariadb:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/nginx:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/registry:latest
libexpat1-2.7.1-150700.3.3.1
Container suse/samba-toolbox:latest
libexpat1-2.7.1-150700.3.3.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
expat-2.7.1-150700.3.3.1
libexpat-devel-2.7.1-150700.3.3.1
libexpat1-2.7.1-150700.3.3.1
libexpat1-32bit-2.7.1-150700.3.3.1

Описание

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.


Затронутые продукты
Container bci/bci-base-fips:latest:libexpat1-2.7.1-150700.3.3.1
Container bci/bci-init:latest:libexpat1-2.7.1-150700.3.3.1
Container bci/bci-sle15-kernel-module-devel:latest:libexpat1-2.7.1-150700.3.3.1
Container bci/gcc:latest:libexpat1-2.7.1-150700.3.3.1

Ссылки