First published: Mon Mar 28 2022(Updated: )
Expat is a C library for parsing XML documents.<br>Security Fix(es):<br><li> expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (CVE-2022-25235)</li> <li> expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236)</li> <li> expat: Integer overflow in storeRawNames() (CVE-2022-25315)</li> <li> expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960)</li> <li> expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143)</li> <li> expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822)</li> <li> expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823)</li> <li> expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824)</li> <li> expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825)</li> <li> expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826)</li> <li> expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827)</li> <li> expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-debuginfo | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-debuginfo | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-devel | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-devel | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-static | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-static | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-debuginfo | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-devel | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
redhat/expat-static | <2.1.0-14.el7_9 | 2.1.0-14.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1069 is classified as critical due to the potential for arbitrary code execution.
To fix RHSA-2022:1069, update the expat package to version 2.1.0-14.el7_9 or higher.
RHSA-2022:1069 addresses CVE-2022-25235 related to malformed UTF-8 sequences and namespace-separator characters.
RHSA-2022:1069 affects various versions of the expat, expat-debuginfo, expat-devel, and expat-static packages.
While RHSA-2022:1069 poses a risk of arbitrary code execution, it does not specifically mention data loss as a direct consequence.