[RHSA-2020:1011] expat security update
Severity
Moderate
Affected Packages
21
CVEs
1
Expat is a C library for parsing XML documents.
Security Fix(es):
- expat: Integer overflow leading to buffer overflow in XML_GetBuffer() (CVE-2015-2716)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section.
- ID
- RHSA-2020:1011
- Severity
- moderate
- URL
- https://access.redhat.com/errata/RHSA-2020:1011
- Published
-
2020-03-31T00:00:00
(4 years ago) - Modified
-
2020-03-31T00:00:00
(4 years ago) - Rights
- Copyright 2020 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 1220607 | https://bugzilla.redhat.com/1220607 | |
RHSA | RHSA-2020:1011 | https://access.redhat.com/errata/RHSA-2020:1011 | |
CVE | CVE-2015-2716 | https://access.redhat.com/security/cve/CVE-2015-2716 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/expat?arch=x86_64&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/expat?arch=s390x&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/expat?arch=s390&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | s390 | |
Affected | pkg:rpm/redhat/expat?arch=ppc64le&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/expat?arch=ppc64&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/expat?arch=ppc&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | ppc | |
Affected | pkg:rpm/redhat/expat?arch=i686&distro=redhat-7 | redhat | expat | < 2.1.0-11.el7 | redhat-7 | i686 | |
Affected | pkg:rpm/redhat/expat-static?arch=x86_64&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/expat-static?arch=s390x&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/expat-static?arch=s390&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | s390 | |
Affected | pkg:rpm/redhat/expat-static?arch=ppc64le&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/expat-static?arch=ppc64&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/expat-static?arch=ppc&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | ppc | |
Affected | pkg:rpm/redhat/expat-static?arch=i686&distro=redhat-7 | redhat | expat-static | < 2.1.0-11.el7 | redhat-7 | i686 | |
Affected | pkg:rpm/redhat/expat-devel?arch=x86_64&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | x86_64 | |
Affected | pkg:rpm/redhat/expat-devel?arch=s390x&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | s390x | |
Affected | pkg:rpm/redhat/expat-devel?arch=s390&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | s390 | |
Affected | pkg:rpm/redhat/expat-devel?arch=ppc64le&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | ppc64le | |
Affected | pkg:rpm/redhat/expat-devel?arch=ppc64&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | ppc64 | |
Affected | pkg:rpm/redhat/expat-devel?arch=ppc&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | ppc | |
Affected | pkg:rpm/redhat/expat-devel?arch=i686&distro=redhat-7 | redhat | expat-devel | < 2.1.0-11.el7 | redhat-7 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |