Fedora Linux 8772 Published by

A mingw-expat security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: mingw-expat-2.4.6-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-3d9d67f558
2022-03-01 18:17:25.167212
--------------------------------------------------------------------------------

Name : mingw-expat
Product : Fedora 35
Version : 2.4.6
Release : 1.fc35
URL :   http://www.libexpat.org/
Summary : MinGW Windows port of expat XML parser library
Description :
This is expat, the C library for parsing XML, written by James Clark. Expat
is a stream oriented XML parser. This means that you register handlers with
the parser prior to starting the parse. These handlers are called when the
parser discovers the associated structures in the document being parsed. A
start tag is an example of the kind of structures for which you may
register handlers.

--------------------------------------------------------------------------------
Update Information:

Update to expat-2.4.6, see
  https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes for details.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Feb 21 2022 Sandro Mani - 2.4.6-1
- Update to 2.4.6
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2056352 - CVE-2022-25313 mingw-expat: expat: stack exhaustion in doctype parsing [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056352
[ 2 ] Bug #2056355 - CVE-2022-25314 mingw-expat: expat: integer overflow in copyString() [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056355
[ 3 ] Bug #2056365 - CVE-2022-25315 mingw-expat: expat: integer overflow in storeRawNames() [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056365
[ 4 ] Bug #2056368 - CVE-2022-25235 mingw-expat: expat: malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056368
[ 5 ] Bug #2056372 - CVE-2022-25236 mingw-expat: expat: namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2056372
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-3d9d67f558' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________