First published: Tue May 16 2023(Updated: )
Expat is a C library for parsing XML documents. The mingw-expat packages provide a port of the Expat library for MinGW. <br>Security Fix(es):<br><li> expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Additional Changes:<br>For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mingw-expat | <2.4.8-2.el8 | 2.4.8-2.el8 |
redhat/mingw32-expat | <2.4.8-2.el8 | 2.4.8-2.el8 |
redhat/mingw32-expat-debuginfo | <2.4.8-2.el8 | 2.4.8-2.el8 |
redhat/mingw64-expat | <2.4.8-2.el8 | 2.4.8-2.el8 |
redhat/mingw64-expat-debuginfo | <2.4.8-2.el8 | 2.4.8-2.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:3068 is classified as important due to a use-after-free vulnerability in the Expat library.
You can fix RHSA-2023:3068 by upgrading to the recommended versions of mingw-expat, mingw32-expat, or mingw64-expat, specifically version 2.4.8-2.el8.
RHSA-2023:3068 addresses the use-after-free vulnerability identified by CVE-2022-40674.
The affected packages in RHSA-2023:3068 include mingw-expat, mingw32-expat, mingw64-expat, and their respective debuginfo packages.
No, RHSA-2023:3068 specifically applies to Red Hat Enterprise Linux 8.