First published: Wed Mar 16 2022(Updated: )
Expat is a C library for parsing XML documents.<br>Security Fix(es):<br><li> expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)</li> <li> expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)</li> <li> expat: Integer overflow in storeRawNames() (CVE-2022-25315)</li> <li> expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960)</li> <li> expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)</li> <li> expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)</li> <li> expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)</li> <li> expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)</li> <li> expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)</li> <li> expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)</li> <li> expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)</li> <li> expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debuginfo | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debuginfo | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debugsource | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debugsource | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-devel | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-devel | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debuginfo | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-debugsource | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat-devel | <2.2.5-4.el8_5.3 | 2.2.5-4.el8_5.3 |
redhat/expat | <2.2.5-4.el8_5.3.aa | 2.2.5-4.el8_5.3.aa |
redhat/expat-debuginfo | <2.2.5-4.el8_5.3.aa | 2.2.5-4.el8_5.3.aa |
redhat/expat-debugsource | <2.2.5-4.el8_5.3.aa | 2.2.5-4.el8_5.3.aa |
redhat/expat-devel | <2.2.5-4.el8_5.3.aa | 2.2.5-4.el8_5.3.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0951 is classified as critical due to the potential for arbitrary code execution.
To fix RHSA-2022:0951, update the expat package to version 2.2.5-4.el8_5.3 or higher.
RHSA-2022:0951 addresses vulnerabilities that allow arbitrary code execution due to malformed UTF-8 sequences and namespace-separator characters in certain XML attributes.
Versions of expat prior to 2.2.5-4.el8_5.3 are affected by RHSA-2022:0951.
There is no known workaround for RHSA-2022:0951; the recommended action is to apply the security update.