{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:7811","synopsis":"Important: mingw-expat security update","severity":"SEVERITY_IMPORTANT","topic":"An update for mingw-expat is now available for Rocky Linux 8.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW. \nThe following packages have been upgraded to a later upstream version: mingw-expat (2.4.8). (BZ#2057023, BZ#2057037, BZ#2057127)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2048356","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2048356","description":"CVE-2022-23990 expat: integer overflow in the doProlog function"},{"ticket":"2056350","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056350","description":"CVE-2022-25313 expat: Stack exhaustion in doctype parsing"},{"ticket":"2056354","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056354","description":"CVE-2022-25314 expat: Integer overflow in copyString()"},{"ticket":"2056363","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056363","description":"CVE-2022-25315 expat: Integer overflow in storeRawNames()"},{"ticket":"2056366","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056366","description":"CVE-2022-25235 expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"},{"ticket":"2056370","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2056370","description":"CVE-2022-25236 expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"}],"cves":[{"name":"CVE-2022-23990","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2022-23990.json","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","cvss3BaseScore":"6.5","cwe":"CWE-190"}],"references":[],"publishedAt":"2023-01-30T05:21:15.190680Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:7811 mingw-expat security update

January 30, 2023
An update for mingw-expat is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important

Summary

An update for mingw-expat is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW. The following packages have been upgraded to a later upstream version: mingw-expat (2.4.8). (BZ#2057023, BZ#2057037, BZ#2057127) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23990.json

Severity
Name: RLSA-2022:7811
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2048356

https://bugzilla.redhat.com/show_bug.cgi?id=2056350

https://bugzilla.redhat.com/show_bug.cgi?id=2056354

https://bugzilla.redhat.com/show_bug.cgi?id=2056363

https://bugzilla.redhat.com/show_bug.cgi?id=2056366

https://bugzilla.redhat.com/show_bug.cgi?id=2056370


Related News