Bug 2262877 (CVE-2023-52425)

Summary: CVE-2023-52425 expat: parsing large tokens can trigger a denial of service
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abobrov, csutherl, erack, jclere, jhorak, pjindal, plodge, szappis, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Expat (libexpat). When parsing a large token that requires multiple buffer fills to complete, Expat has to re-parse the token from start numerous times. This process may trigger excessive resource consumption, leading to a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2262882, 2262883, 2262884    
Bug Blocks: 2262876    

Description Robb Gatica 2024-02-05 23:27:26 UTC
libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.

References:
[1] https://github.com/libexpat/libexpat/pull/789
[2] https://github.com/libexpat/libexpat/commit/34b598c5f594b015c513c73f06e7ced3323edbf1

Comment 1 Robb Gatica 2024-02-05 23:54:56 UTC
Created expat tracking bugs for this issue:

Affects: fedora-all [bug 2262882]


Created mingw-expat tracking bugs for this issue:

Affects: fedora-all [bug 2262883]


Created xmlrpc-c tracking bugs for this issue:

Affects: fedora-all [bug 2262884]

Comment 8 errata-xmlrpc 2024-03-26 16:42:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:1530 https://access.redhat.com/errata/RHSA-2024:1530

Comment 10 errata-xmlrpc 2024-04-02 17:38:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1615 https://access.redhat.com/errata/RHSA-2024:1615

Comment 13 errata-xmlrpc 2024-04-30 14:50:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:2575 https://access.redhat.com/errata/RHSA-2024:2575

Comment 14 errata-xmlrpc 2024-05-14 16:01:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:2839 https://access.redhat.com/errata/RHSA-2024:2839

Comment 15 errata-xmlrpc 2024-06-13 14:34:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:3926 https://access.redhat.com/errata/RHSA-2024:3926

Comment 16 errata-xmlrpc 2024-07-02 15:26:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:4259 https://access.redhat.com/errata/RHSA-2024:4259

Comment 18 errata-xmlrpc 2025-04-02 17:06:51 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2025:3453 https://access.redhat.com/errata/RHSA-2025:3453