A mingw-expat security update has been released for AlmaLinux 8.
ALSA-2022:7811 Important: mingw-expat security update
Type:
security
Severity:
important
Release date:
2022-11-11
Description
The following packages have been upgraded to a later upstream version: mingw-expat (2.4.8). (BZ#2057023, BZ#2057037, BZ#2057127)
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)
* expat: Namespace-separator characters in "xmlns:prefix" attribute values can lead to arbitrary code execution (CVE-2022-25236)
* expat: Integer overflow in storeRawNames() (CVE-2022-25315)
* expat: Stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: Integer overflow in copyString() (CVE-2022-25314)
* expat: Integer overflow in the doProlog function (CVE-2022-23990)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
References:
RHSA-2022:7811
CVE-2022-23990
CVE-2022-25235
CVE-2022-25236
CVE-2022-25313
CVE-2022-25314
CVE-2022-25315
ALSA-2022:7811
Updates packages:
mingw64-expat-2.4.8-1.el8.noarch.rpm
mingw32-expat-2.4.8-1.el8.noarch.rpm
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.