[RHSA-2022:7811] mingw-expat security update
Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW.
The following packages have been upgraded to a later upstream version: mingw-expat (2.4.8). (BZ#2057023, BZ#2057037, BZ#2057127)
Security Fix(es):
expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)
expat: Integer overflow in storeRawNames() (CVE-2022-25315)
expat: Stack exhaustion in doctype parsing (CVE-2022-25313)
expat: Integer overflow in copyString() (CVE-2022-25314)
expat: Integer overflow in the doProlog function (CVE-2022-23990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
Package | Affected Version |
---|---|
pkg:rpm/redhat/mingw64-expat?distro=redhat-8 | < 2.4.8-1.el8 |
pkg:rpm/redhat/mingw32-expat?distro=redhat-8 | < 2.4.8-1.el8 |
- ID
- RHSA-2022:7811
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2022:7811
- Published
-
2022-11-08T00:00:00
(22 months ago) - Modified
-
2022-11-08T00:00:00
(22 months ago) - Rights
- Copyright 2022 Red Hat, Inc.
- Other Advisories
-
- ALAS-2022-1570
- ALAS-2022-1573
- ALAS-2022-1585
- ALAS-2023-1882
- ALAS2-2022-1759
- ALAS2-2022-1764
- ALAS2-2022-1779
- ALAS2-2022-1795
- ALAS2-2023-2280
- ALPINE:CVE-2022-23990
- ALPINE:CVE-2022-25235
- ALPINE:CVE-2022-25236
- ALPINE:CVE-2022-25313
- ALPINE:CVE-2022-25314
- ALPINE:CVE-2022-25315
- ALSA-2022:0818
- ALSA-2022:0845
- ALSA-2022:0951
- ALSA-2022:1643
- ALSA-2022:5244
- ALSA-2022:5314
- ALSA-2022:7811
- ASB-A-221256678
- ASB-A-221384482
- DSA-5073-1
- DSA-5085-1
- ELSA-2022-0818
- ELSA-2022-0824
- ELSA-2022-0845
- ELSA-2022-0850
- ELSA-2022-0951
- ELSA-2022-1069
- ELSA-2022-1643
- ELSA-2022-5244
- ELSA-2022-5314
- ELSA-2022-9227
- ELSA-2022-9232
- ELSA-2022-9359
- FEDORA-2022-01f0553b59
- FEDORA-2022-04f206996b
- FEDORA-2022-3d9d67f558
- FEDORA-2022-88f6a3d290
- FEDORA-2022-d2abd0858e
- FEDORA-2022-f202d1a045
- FEDORA-2023-97a977a96a
- FEDORA-2023-99ba1917da
- GLSA-202209-24
- MS:CVE-2022-25235
- MS:CVE-2022-25236
- MS:CVE-2022-25313
- MS:CVE-2022-25314
- MS:CVE-2022-25315
- openSUSE-SU-2022:0498-1
- openSUSE-SU-2022:0713-1
- openSUSE-SU-2022:0844-1
- RHSA-2022:0818
- RHSA-2022:0824
- RHSA-2022:0845
- RHSA-2022:0850
- RHSA-2022:0951
- RHSA-2022:1069
- RHSA-2022:1643
- RHSA-2022:5244
- RHSA-2022:5314
- SSA:2022-027-01
- SSA:2022-050-01
- SUSE-SU-2022:0495-1
- SUSE-SU-2022:0498-1
- SUSE-SU-2022:0698-1
- SUSE-SU-2022:0713-1
- SUSE-SU-2022:0842-1
- SUSE-SU-2022:0844-1
- SUSE-SU-2022:0844-2
- SUSE-SU-2022:2294-1
- SUSE-SU-2024:0782-1
- SUSE-SU-2024:0782-2
- SUSE-SU-2024:0784-1
- USN-5288-1
- USN-5320-1
- USN-5455-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2048356 | https://bugzilla.redhat.com/2048356 | |
Bugzilla | 2056350 | https://bugzilla.redhat.com/2056350 | |
Bugzilla | 2056354 | https://bugzilla.redhat.com/2056354 | |
Bugzilla | 2056363 | https://bugzilla.redhat.com/2056363 | |
Bugzilla | 2056366 | https://bugzilla.redhat.com/2056366 | |
Bugzilla | 2056370 | https://bugzilla.redhat.com/2056370 | |
RHSA | RHSA-2022:7811 | https://access.redhat.com/errata/RHSA-2022:7811 | |
CVE | CVE-2022-23990 | https://access.redhat.com/security/cve/CVE-2022-23990 | |
CVE | CVE-2022-25235 | https://access.redhat.com/security/cve/CVE-2022-25235 | |
CVE | CVE-2022-25236 | https://access.redhat.com/security/cve/CVE-2022-25236 | |
CVE | CVE-2022-25313 | https://access.redhat.com/security/cve/CVE-2022-25313 | |
CVE | CVE-2022-25314 | https://access.redhat.com/security/cve/CVE-2022-25314 | |
CVE | CVE-2022-25315 | https://access.redhat.com/security/cve/CVE-2022-25315 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/mingw64-expat?distro=redhat-8 | redhat | mingw64-expat | < 2.4.8-1.el8 | redhat-8 | ||
Affected | pkg:rpm/redhat/mingw32-expat?distro=redhat-8 | redhat | mingw32-expat | < 2.4.8-1.el8 | redhat-8 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |