Bug 35089 - expat new security issues CVE-2026-24515 and CVE-2026-25210
Summary: expat new security issues CVE-2026-24515 and CVE-2026-25210
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2026-02-02 09:50 CET by Nicolas Salguero
Modified: 2026-02-04 19:10 CET (History)
3 users (show)

See Also:
Source RPM: expat-2.7.3-1.mga9.src.rpm
CVE: CVE-2026-24515, CVE-2026-25210
Status comment:
herman.viaene: test_passed_mga9_64+


Attachments

Description Nicolas Salguero 2026-02-02 09:50:34 CET
Reference:
https://www.openwall.com/lists/oss-security/2026/01/31/1
Nicolas Salguero 2026-02-02 09:51:25 CET

Whiteboard: (none) => MGA9TOO
Source RPM: (none) => expat-2.7.3-1.mga10.src.rpm, expat-2.7.3-1.mga9.src.rpm
CVE: (none) => CVE-2026-24515, CVE-2026-25210
Status comment: (none) => Fixed upstream in 2.7.4
Flags: (none) => affects_mga9+

Comment 1 Nicolas Salguero 2026-02-02 10:04:34 CET
For Cauldron, I asked for a freeze move.

Suggested advisory:
========================

The updated packages fix security vulnerabilities:

In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data. (CVE-2026-24515)

In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)

References:
https://www.openwall.com/lists/oss-security/2026/01/31/1
========================

Updated packages in core/updates_testing:
========================
expat-2.7.4-1.mga9
lib(64)expat1-2.7.4-1.mga9
lib(64)expat-devel-2.7.4-1.mga9

from SRPM:
expat-2.7.4-1.mga9.src.rpm

Whiteboard: MGA9TOO => (none)
Source RPM: expat-2.7.3-1.mga10.src.rpm, expat-2.7.3-1.mga9.src.rpm => expat-2.7.3-1.mga9.src.rpm
Status comment: Fixed upstream in 2.7.4 => (none)
Status: NEW => ASSIGNED
Version: Cauldron => 9
Flags: affects_mga9+ => (none)
Assignee: bugsquad => qa-bugs

Comment 2 Herman Viaene 2026-02-02 17:12:32 CET
MGA9-64 server Plasma Wayland on Compaq H000SB.
No installation issues.
Followed instructions from wiki: https://wiki.mageia.org/en/QA_procedure:Expat

$ python testexpat.py
Tested OK
$ xmlwf /etc/xml/catalog
$ xmlwf /etc/passwd
/etc/passwd:1:16: not well-formed (invalid token)

Looks OK.

Flags: (none) => test_passed_mga9_64+
CC: (none) => herman.viaene
Whiteboard: (none) => MGA9-64-OK

katnatek 2026-02-03 00:17:04 CET

Keywords: (none) => advisory

Comment 3 Thomas Andrews 2026-02-04 16:19:31 CET
Validating.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 4 Mageia Robot 2026-02-04 19:10:35 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2026-0031.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.