|
|
Message-ID: <96eb9370-0f79-45f5-9073-adab4693b192@pipping.org>
Date: Mon, 11 May 2026 22:43:24 +0200
From: Sebastian Pipping <sebastian@...ping.org>
To: oss-security@...ts.openwall.com
Subject: libexpat 2.8.1 fixes CVE-2026-45186 (denial of service)
Hello oss-security,
just a quick note that libexpat 2.8.1 (or "Expat 2.8.1") released
yesterday is fixing CVE-2026-45186:
Fix quadratic runtime from attribute name collision checks that
allowed denial of service attacks through moderately sized crafted
XML input (CWE-407).
Please note that a layer of compression around XML can significantly
reduce the minimum attack payload size.
Some key links are:
- The blog post about it
https://blog.hartwork.org/posts/expat-2-8-1-released/
- The change log of release 2.8.1
https://github.com/libexpat/libexpat/blob/R_2_8_1/expat/Changes
- The fixing pull request
https://github.com/libexpat/libexpat/pull/1216
- The NVD CVE metadata
https://nvd.nist.gov/vuln/detail/CVE-2026-45186
PS: The CVE database lists an unrealistically low CVSS score for this.
The complexity of an attack is very low (not "High") and the attack
vector is remote (not "Local"). I have asked Mitre to fix this
earlier today. My blog post linked above has a few more words on
that topic.
Best
Sebastian
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.