[RHSA-2022:0951] expat security update
Expat is a C library for parsing XML documents.
Security Fix(es):
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
expat: Integer overflow in storeRawNames() (CVE-2022-25315)
expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960)
expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)
expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)
expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)
expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)
expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)
expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)
expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)
expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/expat?arch=x86_64&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat?arch=s390x&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat?arch=ppc64le&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat?arch=i686&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat?arch=aarch64&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat-devel?arch=x86_64&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat-devel?arch=s390x&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat-devel?arch=ppc64le&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat-devel?arch=i686&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
pkg:rpm/redhat/expat-devel?arch=aarch64&distro=redhat-8.5 | < 2.2.5-4.el8_5.3 |
- ID
- RHSA-2022:0951
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:0951
- Published
-
2022-03-16T00:00:00
(2 years ago) - Modified
-
2022-03-16T00:00:00
(2 years ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1569
- ALAS-2022-1570
- ALAS-2022-1573
- ALAS-2022-1585
- ALAS-2022-1588
- ALAS-2022-1603
- ALAS2-2022-1754
- ALAS2-2022-1759
- ALAS2-2022-1764
- ALAS2-2022-1779
- ALAS2-2022-1788
- ALAS2-2022-1795
- ALAS2-2022-1809
- ALPINE:CVE-2021-45960
- ALPINE:CVE-2021-46143
- ALPINE:CVE-2022-22822
- ALPINE:CVE-2022-22823
- ALPINE:CVE-2022-22824
- ALPINE:CVE-2022-22825
- ALPINE:CVE-2022-22826
- ALPINE:CVE-2022-22827
- ALPINE:CVE-2022-23852
- ALPINE:CVE-2022-25235
- ALPINE:CVE-2022-25236
- ALPINE:CVE-2022-25315
- ALSA-2022:0818
- ALSA-2022:0845
- ALSA-2022:0951
- ALSA-2022:1643
- ALSA-2022:7692
- ALSA-2022:7811
- ASB-A-219942275
- ASB-A-221255869
- DSA-5073-1
- DSA-5085-1
- ELSA-2022-0818
- ELSA-2022-0824
- ELSA-2022-0845
- ELSA-2022-0850
- ELSA-2022-0951
- ELSA-2022-1069
- ELSA-2022-1643
- ELSA-2022-7692
- ELSA-2022-9227
- ELSA-2022-9359
- FEDORA-2022-01f0553b59
- FEDORA-2022-04f206996b
- FEDORA-2022-3d9d67f558
- FEDORA-2022-f202d1a045
- FEDORA-2023-97a977a96a
- FEDORA-2023-99ba1917da
- GLSA-202209-24
- MS:CVE-2021-45960
- MS:CVE-2021-46143
- MS:CVE-2022-22822
- MS:CVE-2022-22823
- MS:CVE-2022-22824
- MS:CVE-2022-22825
- MS:CVE-2022-22826
- MS:CVE-2022-22827
- MS:CVE-2022-23852
- MS:CVE-2022-25235
- MS:CVE-2022-25236
- MS:CVE-2022-25315
- openSUSE-SU-2022:0178-1
- openSUSE-SU-2022:0498-1
- openSUSE-SU-2022:0713-1
- openSUSE-SU-2022:0844-1
- RHSA-2022:0818
- RHSA-2022:0824
- RHSA-2022:0845
- RHSA-2022:0850
- RHSA-2022:1069
- RHSA-2022:1643
- RHSA-2022:7692
- RHSA-2022:7811
- RLSA-2022:7692
- SSA:2022-016-01
- SSA:2022-025-01
- SSA:2022-050-01
- SUSE-SU-2022:0178-1
- SUSE-SU-2022:0179-1
- SUSE-SU-2022:0495-1
- SUSE-SU-2022:0498-1
- SUSE-SU-2022:0698-1
- SUSE-SU-2022:0713-1
- SUSE-SU-2022:0842-1
- SUSE-SU-2022:0844-1
- SUSE-SU-2022:0844-2
- SUSE-SU-2022:2294-1
- SUSE-SU-2024:0782-1
- SUSE-SU-2024:0782-2
- SUSE-SU-2024:0784-1
- USN-5288-1
- USN-5320-1
- USN-5455-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/expat?arch=x86_64&distro=redhat-8.5 | redhat | expat | < 2.2.5-4.el8_5.3 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/expat?arch=s390x&distro=redhat-8.5 | redhat | expat | < 2.2.5-4.el8_5.3 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/expat?arch=ppc64le&distro=redhat-8.5 | redhat | expat | < 2.2.5-4.el8_5.3 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/expat?arch=i686&distro=redhat-8.5 | redhat | expat | < 2.2.5-4.el8_5.3 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/expat?arch=aarch64&distro=redhat-8.5 | redhat | expat | < 2.2.5-4.el8_5.3 | redhat-8.5 | aarch64 | |
Affected | pkg:rpm/redhat/expat-devel?arch=x86_64&distro=redhat-8.5 | redhat | expat-devel | < 2.2.5-4.el8_5.3 | redhat-8.5 | x86_64 | |
Affected | pkg:rpm/redhat/expat-devel?arch=s390x&distro=redhat-8.5 | redhat | expat-devel | < 2.2.5-4.el8_5.3 | redhat-8.5 | s390x | |
Affected | pkg:rpm/redhat/expat-devel?arch=ppc64le&distro=redhat-8.5 | redhat | expat-devel | < 2.2.5-4.el8_5.3 | redhat-8.5 | ppc64le | |
Affected | pkg:rpm/redhat/expat-devel?arch=i686&distro=redhat-8.5 | redhat | expat-devel | < 2.2.5-4.el8_5.3 | redhat-8.5 | i686 | |
Affected | pkg:rpm/redhat/expat-devel?arch=aarch64&distro=redhat-8.5 | redhat | expat-devel | < 2.2.5-4.el8_5.3 | redhat-8.5 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |