mingw-expat-2.4.8-1.el8
エラータID: AXSA:2022-4252:02
Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW.
The following packages have been upgraded to a later upstream version: mingw-expat (2.4.8).
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
* expat: Integer overflow in storeRawNames() (CVE-2022-25315)
* expat: Stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: Integer overflow in copyString() (CVE-2022-25314)
* expat: Integer overflow in the doProlog function (CVE-2022-23990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-23990
Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
CVE-2022-25235
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
CVE-2022-25236
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
CVE-2022-25313
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
CVE-2022-25314
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
CVE-2022-25315
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
Update packages.
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
N/A
SRPMS
- mingw-expat-2.4.8-1.el8.src.rpm
MD5: 67b498f728704becc1d1129202d7bed1
SHA-256: ad5da8c629e1fbd9236e429fdc0cdfc31fa325fa0e9fefa53ceb8ec00cd6c93e
Size: 561.56 kB
Asianux Server 8 for x86_64
- mingw32-expat-2.4.8-1.el8.noarch.rpm
MD5: 56cf6e03cefdf547699a1434622381da
SHA-256: b41f1f440ee2314777d4d019710bf386d53f207038038b6368f842dfe20f22f2
Size: 116.48 kB - mingw64-expat-2.4.8-1.el8.noarch.rpm
MD5: 5391f7d281652311b1180cb399f87c43
SHA-256: 448ab4ad314a91a9ce0d5f822c9dbfdf56cb4ef2f9dc136d6a72b22c13f3fecf
Size: 123.05 kB