RedHat: RHSA-2022-7811:01 Important: mingw-expat security update
Summary
Expat is a C library for parsing XML documents. The mingw-expat packages
provide a port of the Expat library for MinGW.
The following packages have been upgraded to a later upstream version:
mingw-expat (2.4.8). (BZ#2057023, BZ#2057037, BZ#2057127)
Security Fix(es):
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code
execution (CVE-2022-25235)
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute
values can lead to arbitrary code execution (CVE-2022-25236)
* expat: Integer overflow in storeRawNames() (CVE-2022-25315)
* expat: Stack exhaustion in doctype parsing (CVE-2022-25313)
* expat: Integer overflow in copyString() (CVE-2022-25314)
* expat: Integer overflow in the doProlog function (CVE-2022-23990)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.7 Release Notes linked from the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2022-23990 https://access.redhat.com/security/cve/CVE-2022-25235 https://access.redhat.com/security/cve/CVE-2022-25236 https://access.redhat.com/security/cve/CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 https://access.redhat.com/security/cve/CVE-2022-25315 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
Package List
Red Hat CodeReady Linux Builder (v. 8):
Source:
mingw-expat-2.4.8-1.el8.src.rpm
noarch:
mingw32-expat-2.4.8-1.el8.noarch.rpm
mingw32-expat-debuginfo-2.4.8-1.el8.noarch.rpm
mingw64-expat-2.4.8-1.el8.noarch.rpm
mingw64-expat-debuginfo-2.4.8-1.el8.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for mingw-expat is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat CodeReady Linux Builder (v. 8) - noarch
Bugs Fixed
2048356 - CVE-2022-23990 expat: integer overflow in the doProlog function
2056350 - CVE-2022-25313 expat: Stack exhaustion in doctype parsing
2056354 - CVE-2022-25314 expat: Integer overflow in copyString()
2056363 - CVE-2022-25315 expat: Integer overflow in storeRawNames()
2056366 - CVE-2022-25235 expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
2056370 - CVE-2022-25236 expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution