Fedora Linux 8776 Published by

A mingw-expat security update has been released for Fedora 34.



SECURITY: Fedora 34 Update: mingw-expat-2.4.6-1.fc34


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-04f206996b
2022-03-01 18:34:51.146363
--------------------------------------------------------------------------------

Name : mingw-expat
Product : Fedora 34
Version : 2.4.6
Release : 1.fc34
URL :   http://www.libexpat.org/
Summary : MinGW Windows port of expat XML parser library
Description :
This is expat, the C library for parsing XML, written by James Clark. Expat
is a stream oriented XML parser. This means that you register handlers with
the parser prior to starting the parse. These handlers are called when the
parser discovers the associated structures in the document being parsed. A
start tag is an example of the kind of structures for which you may
register handlers.

--------------------------------------------------------------------------------
Update Information:

Update to expat-2.4.6, see
  https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes for details.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 21 2022 Sandro Mani - 2.4.6-1
- Update to 2.4.6
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2056352 - CVE-2022-25313 mingw-expat: expat: stack exhaustion in doctype parsing [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056352
[ 2 ] Bug #2056355 - CVE-2022-25314 mingw-expat: expat: integer overflow in copyString() [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056355
[ 3 ] Bug #2056365 - CVE-2022-25315 mingw-expat: expat: integer overflow in storeRawNames() [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056365
[ 4 ] Bug #2056368 - CVE-2022-25235 mingw-expat: expat: malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056368
[ 5 ] Bug #2056372 - CVE-2022-25236 mingw-expat: expat: namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056372
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-04f206996b' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________