Overview
| Artifact ID: | 1a6ca85cd5257bd8beecd66e764fca6ca69d662091860458749793103255f26a |
|---|---|
| Ticket: | bac53da477d3a4784ac9b4fa014f6a01f7dffdf4
update to expat 2.7.3 to fix CVE-2025-59375 & CVE-2024-8176 |
| User & Date: | anonymous 2026-01-15 13:58:25 |
Changes
- foundin changed to: "0.9.6"
- icomment:
There have been several CVE fixed in libexpat (at this time 2.7.3) since the 2.7.1 version that in tDOM 0.9.6: https://nvd.nist.gov/vuln/detail/CVE-2025-59375 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 Detail: Release 2.7.3 Wed September 24 2025 Security fixes: #1046 #1048 Fix alignment of internal allocations for some non-amd64 architectures (e.g. sparc32); fixes up on the fix to CVE-2025-59375 from #1034 (of Expat 2.7.2 and related backports) #1059 Fix a class of false positives where input should have been rejected with error XML_ERROR_ASYNC_ENTITY; regression from CVE-2024-8176 fix pull request #973 (of Expat 2.7.0 and related backports). Please check the added unit tests for example documents. Release 2.7.2 Tue September 16 2025 Security fixes: #1018 #1034 CVE-2025-59375 -- Disallow use of disproportional amounts of dynamic memory from within an Expat parser (e.g. previously a ~250 KiB sized document was able to cause allocation of ~800 MiB from the heap, i.e. an "amplification" of factor ~3,300); once a threshold (that defaults to 64 MiB) is reached, a maximum amplification factor (that defaults to 100.0) is enforced, and violating documents are rejected with an out-of-memory error. There are two new API functions to fine-tune this new behavior: - XML_SetAllocTrackerActivationThreshold - XML_SetAllocTrackerMaximumAmplification . If you ever need to increase these defaults for non-attack XML payload, please file a bug report with libexpat. There is also a new environment variable EXPAT_MALLOC_DEBUG=(0|1|2) to control the verbosity of allocations debugging at runtime, disabled by default. Known impact is (reliable and easy) denial of service: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C (Base Score: 7.5, Temporal Score: 7.2) Please note that a layer of compression around XML can significantly reduce the minimum attack payload size. Distributors intending to backport (or cherry-pick) the fix need to copy 99% of the related pull request, not just the "lib: Implement tracking of dynamic memory allocations" commit, to not end up with a state that literally does both too much and too little at the same time. Appending ".diff" to the pull request URL could be of help. Any plan to update to 2.7.3 (or higher) in next tDOM version to come? - login: "anonymous"
- mimetype: "text/x-markdown"
- severity changed to: "Important"
- status changed to: "Open"
- title changed to:
update to expat 2.7.3 to fix CVE-2025-59375 & CVE-2024-8176
- type changed to: "Feature_Request"