<div class="container">
    <h1>Security update for expat</h1>

    <table class="table table-striped table-bordered">
        <tbody>
        <tr>
            <th>Announcement ID:</th>
            <td>SUSE-SU-2025:03239-1</td>
        </tr>
        <tr>
            <th>Release Date:</th>
            <td>2025-09-16T17:04:05Z</td>
        </tr>
        
        <tr>
            <th>Rating:</th>
            <td>important</td>
        </tr>
        <tr>
            <th>References:</th>
            <td>
                <ul>
                    
                        <li style="display: inline;">
                            <a href="https://bugzilla.suse.com/show_bug.cgi?id=1239618">bsc#1239618</a>
                        </li>
                    
                    
                        <li style="display: inline;">
                            <a href="https://jira.suse.com/browse/PED-12507">jsc#PED-12507</a>
                        </li>
                    
                </ul>
            </td>
        </tr>
        
            <tr>
                <th>
                    Cross-References:
                </th>
                <td>
                    <ul>
                    
                        <li style="display: inline;">
                            <a href="https://www.suse.com/security/cve/CVE-2024-8176.html">CVE-2024-8176</a>
                        </li>
                    
                    </ul>
                </td>
            </tr>
            <tr>
                <th>CVSS scores:</th>
                <td>
                    <ul class="list-group">
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">8.7</span>
                                <span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        SUSE
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                            <li class="list-group-item">
                                <span class="cvss-reference">CVE-2024-8176</span>
                                <span class="cvss-source">
                                    (
                                    
                                        NVD
                                    
                                    ):
                                </span>
                                <span class="cvss-score">7.5</span>
                                <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
                            </li>
                        
                    </ul>
                </td>
            </tr>
        
        <tr>
            <th>Affected Products:</th>
            <td>
                <ul class="list-group">
                    
                        <li class="list-group-item">Basesystem Module 15-SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server 15 SP7</li>
                    
                        <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP7</li>
                    
                </ul>
            </td>
        </tr>
        </tbody>
    </table>

    <p>An update that solves one vulnerability and contains one feature can now be installed.</p>

    


    
        <h2>Description:</h2>
    
    <p>This update for expat fixes the following issues:</p>
<p>expat was updated to version 2.7.1:</p>
<ul>
<li>
<p>Bug fixes:</p>
<ul>
<li>
<p>Restore event pointer behavior from Expat 2.6.4
    (that the fix to CVE-2024-8176 changed in 2.7.0);
    affected API functions are:</p>
<pre><code>        - XML_GetCurrentByteCount
        - XML_GetCurrentByteIndex
        - XML_GetCurrentColumnNumber
        - XML_GetCurrentLineNumber
        - XML_GetInputContext
</code></pre>
<ul>
<li>Other changes:</li>
</ul>
</li>
<li>
<p>Fix printf format specifiers for 32bit Emscripten</p>
</li>
<li>docs: Promote OpenSSF Best Practices self-certification</li>
<li>tests/benchmark: Resolve mistaken double close</li>
<li>Address compiler warnings</li>
<li>Version info bumped from 11:1:10 (libexpat<em>.so.1.10.1)
     to 11:2:10 (libexpat</em>.so.1.10.2); see https://verbump.de/
     for what these numbers do</li>
</ul>
</li>
</ul>
<p>Version update to 2.7.0 (CVE-2024-8176, bsc#1239618, jsc#PED-12507)</p>
<ul>
<li>
<p>Security fixes:</p>
</li>
<li>
<p>CVE-2024-8176 -- Fix crash from chaining a large number of
  entities caused by stack overflow by resolving use of recursion,
  for all three uses of entities: - general entities in character data
  ("<e>&g1;</e>") - general entities in attribute values
  ("<e k1=&#x27;&g1;&#x27;/>") - parameter entities ("%p1;")</p>
</li>
</ul>
<p>Known impact is (reliable and easy) denial of service:
  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
  (Base Score: 7.5, Temporal Score: 7.2)
  Please note that a layer of compression around XML can
  significantly reduce the minimum attack payload size.</p>
<ul>
<li>Other changes:</li>
<li>docs: Add missing documentation of error code XML_ERROR_NOT_STARTED
    that was introduced with 2.6.4</li>
<li>docs: Document need for C++11 compiler for use from C++</li>
<li>Address Cppcheck warnings</li>
<li>
<p>Mass-migrate links from http:// to https://</p>
</li>
<li>
<p>Document changes since the previous release</p>
</li>
<li>Version info bumped from 11:0:10 (libexpat<em>.so.1.10.0)
    to 11:1:10 (libexpat</em>.so.1.10.1); see https://verbump.de/
    for what these numbers do</li>
</ul>



    

    <h2>Patch Instructions:</h2>
    <p>
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".<br/>

        Alternatively you can run the command listed for your product:
    </p>
    <ul class="list-group">
        
            <li class="list-group-item">
                Basesystem Module 15-SP7
                
                    
                        <br/>
                        <code>zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3239=1</code>
                    
                    
                
            </li>
        
    </ul>

    <h2>Package List:</h2>
    <ul>
        
            
                <li>
                    Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
                    <ul>
                        
                            <li>expat-2.7.1-150700.3.3.1</li>
                        
                            <li>expat-debuginfo-2.7.1-150700.3.3.1</li>
                        
                            <li>libexpat-devel-2.7.1-150700.3.3.1</li>
                        
                            <li>libexpat1-2.7.1-150700.3.3.1</li>
                        
                            <li>libexpat1-debuginfo-2.7.1-150700.3.3.1</li>
                        
                            <li>expat-debugsource-2.7.1-150700.3.3.1</li>
                        
                    </ul>
                </li>
            
                <li>
                    Basesystem Module 15-SP7 (x86_64)
                    <ul>
                        
                            <li>libexpat1-32bit-2.7.1-150700.3.3.1</li>
                        
                            <li>libexpat1-32bit-debuginfo-2.7.1-150700.3.3.1</li>
                        
                            <li>expat-32bit-debuginfo-2.7.1-150700.3.3.1</li>
                        
                    </ul>
                </li>
            
        
    </ul>

    
        <h2>References:</h2>
        <ul>
            
                
                    <li>
                        <a href="https://www.suse.com/security/cve/CVE-2024-8176.html">https://www.suse.com/security/cve/CVE-2024-8176.html</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://bugzilla.suse.com/show_bug.cgi?id=1239618">https://bugzilla.suse.com/show_bug.cgi?id=1239618</a>
                    </li>
                
            
                
                    <li>
                        <a href="https://jira.suse.com/browse/PED-12507">https://jira.suse.com/browse/PED-12507</a>
                    </li>
                
            
        </ul>
    
</div>