tDOM

Ticket Change Details
Login

Ticket Change Details

Overview

Artifact ID: 1a6ca85cd5257bd8beecd66e764fca6ca69d662091860458749793103255f26a
Ticket: bac53da477d3a4784ac9b4fa014f6a01f7dffdf4
update to expat 2.7.3 to fix CVE-2025-59375 & CVE-2024-8176
User & Date: anonymous 2026-01-15 13:58:25
Changes

  1. foundin changed to: "0.9.6"
  2. icomment:
    There have been several CVE fixed in libexpat (at this time 2.7.3) since the 2.7.1 version that in tDOM 0.9.6:
    
    https://nvd.nist.gov/vuln/detail/CVE-2025-59375
    https://nvd.nist.gov/vuln/detail/CVE-2024-8176
    
    Detail:
    
    Release 2.7.3 Wed September 24 2025
            Security fixes:
         #1046 #1048  Fix alignment of internal allocations for some non-amd64
                        architectures (e.g. sparc32); fixes up on the fix to
                        CVE-2025-59375 from #1034 (of Expat 2.7.2 and related
                        backports)
               #1059  Fix a class of false positives where input should have been
                        rejected with error XML_ERROR_ASYNC_ENTITY; regression from
                        CVE-2024-8176 fix pull request #973 (of Expat 2.7.0 and
                        related backports). Please check the added unit tests for
                        example documents.
    
    Release 2.7.2 Tue September 16 2025
            Security fixes:
         #1018 #1034  CVE-2025-59375 -- Disallow use of disproportional amounts of
                        dynamic memory from within an Expat parser (e.g. previously
                        a ~250 KiB sized document was able to cause allocation of
                        ~800 MiB from the heap, i.e. an "amplification" of factor
                        ~3,300); once a threshold (that defaults to 64 MiB) is
                        reached, a maximum amplification factor (that defaults to
                        100.0) is enforced, and violating documents are rejected
                        with an out-of-memory error.
                        There are two new API functions to fine-tune this new
                        behavior:
                          - XML_SetAllocTrackerActivationThreshold
                          - XML_SetAllocTrackerMaximumAmplification .
                        If you ever need to increase these defaults for non-attack
                        XML payload, please file a bug report with libexpat.
                          There is also a new environment variable
                        EXPAT_MALLOC_DEBUG=(0|1|2) to control the verbosity
                        of allocations debugging at runtime, disabled by default.
                          Known impact is (reliable and easy) denial of service:
                        CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
                        (Base Score: 7.5, Temporal Score: 7.2)
                        Please note that a layer of compression around XML can
                        significantly reduce the minimum attack payload size.
                          Distributors intending to backport (or cherry-pick) the
                        fix need to copy 99% of the related pull request, not just
                        the "lib: Implement tracking of dynamic memory allocations"
                        commit, to not end up with a state that literally does both
                        too much and too little at the same time. Appending ".diff"
                        to the pull request URL could be of help.
    
    Any plan to update to 2.7.3 (or higher) in next tDOM version to come?
    
  3. login: "anonymous"
  4. mimetype: "text/x-markdown"
  5. severity changed to: "Important"
  6. status changed to: "Open"
  7. title changed to:
    update to expat 2.7.3 to fix CVE-2025-59375 & CVE-2024-8176
    
  8. type changed to: "Feature_Request"