-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-04f206996b 2022-03-01 18:34:51.146363 --------------------------------------------------------------------------------
Name : mingw-expat Product : Fedora 34 Version : 2.4.6 Release : 1.fc34 URL : http://www.libexpat.org/ Summary : MinGW Windows port of expat XML parser library Description : This is expat, the C library for parsing XML, written by James Clark. Expat is a stream oriented XML parser. This means that you register handlers with the parser prior to starting the parse. These handlers are called when the parser discovers the associated structures in the document being parsed. A start tag is an example of the kind of structures for which you may register handlers.
-------------------------------------------------------------------------------- Update Information:
Update to expat-2.4.6, see https://github.com/libexpat/libexpat/blob/R_2_4_6/expat/Changes for details. -------------------------------------------------------------------------------- ChangeLog:
* Mon Feb 21 2022 Sandro Mani manisandro@gmail.com - 2.4.6-1 - Update to 2.4.6 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #2056352 - CVE-2022-25313 mingw-expat: expat: stack exhaustion in doctype parsing [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2056352 [ 2 ] Bug #2056355 - CVE-2022-25314 mingw-expat: expat: integer overflow in copyString() [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2056355 [ 3 ] Bug #2056365 - CVE-2022-25315 mingw-expat: expat: integer overflow in storeRawNames() [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2056365 [ 4 ] Bug #2056368 - CVE-2022-25235 mingw-expat: expat: malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2056368 [ 5 ] Bug #2056372 - CVE-2022-25236 mingw-expat: expat: namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2056372 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-04f206996b' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------