Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in mingw-expat
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in mingw-expat
ID: FEDORA-2022-04f206996b
Distribution: Fedora
Plattformen: Fedora 34
Datum: Mi, 2. März 2022, 07:24
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235
Applikationen: expat

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2022-04f206996b
2022-03-01 18:34:51.146363
-------------------------------------------------------------------------------
-

Name : mingw-expat
Product : Fedora 34
Version : 2.4.6
Release : 1.fc34
URL : http://www.libexpat.org/
Summary : MinGW Windows port of expat XML parser library
Description :
This is expat, the C library for parsing XML, written by James Clark. Expat
is a stream oriented XML parser. This means that you register handlers with
the parser prior to starting the parse. These handlers are called when the
parser discovers the associated structures in the document being parsed. A
start tag is an example of the kind of structures for which you may
register handlers.

-------------------------------------------------------------------------------
-
Update Information:

Update to expat-2.4.6, see
https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes for details.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 21 2022 Sandro Mani <manisandro@gmail.com> - 2.4.6-1
- Update to 2.4.6
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #2056352 - CVE-2022-25313 mingw-expat: expat: stack exhaustion in
doctype parsing [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2056352
[ 2 ] Bug #2056355 - CVE-2022-25314 mingw-expat: expat: integer overflow in
copyString() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2056355
[ 3 ] Bug #2056365 - CVE-2022-25315 mingw-expat: expat: integer overflow in
storeRawNames() [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2056365
[ 4 ] Bug #2056368 - CVE-2022-25235 mingw-expat: expat: malformed 2- and
3-byte UTF-8 sequences can lead to arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2056368
[ 5 ] Bug #2056372 - CVE-2022-25236 mingw-expat: expat: namespace-separator
characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2056372
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-04f206996b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung