-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: expat security update Advisory ID: RHSA-2022:6833-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:6833 Issue date: 2022-10-06 CVE Names: CVE-2022-40674 ==================================================================== 1. Summary: An update for expat is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS E4S (v. 8.1) - aarch64, ppc64le, s390x, x86_64 3. Description: Expat is a C library for parsing XML documents. Security Fix(es): * expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, applications using the Expat library must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2130769 - CVE-2022-40674 expat: a use-after-free in the doContent function in xmlparse.c 6. Package List: Red Hat Enterprise Linux BaseOS E4S (v. 8.1): Source: expat-2.2.5-3.el8_1.2.src.rpm aarch64: expat-2.2.5-3.el8_1.2.aarch64.rpm expat-debuginfo-2.2.5-3.el8_1.2.aarch64.rpm expat-debugsource-2.2.5-3.el8_1.2.aarch64.rpm expat-devel-2.2.5-3.el8_1.2.aarch64.rpm ppc64le: expat-2.2.5-3.el8_1.2.ppc64le.rpm expat-debuginfo-2.2.5-3.el8_1.2.ppc64le.rpm expat-debugsource-2.2.5-3.el8_1.2.ppc64le.rpm expat-devel-2.2.5-3.el8_1.2.ppc64le.rpm s390x: expat-2.2.5-3.el8_1.2.s390x.rpm expat-debuginfo-2.2.5-3.el8_1.2.s390x.rpm expat-debugsource-2.2.5-3.el8_1.2.s390x.rpm expat-devel-2.2.5-3.el8_1.2.s390x.rpm x86_64: expat-2.2.5-3.el8_1.2.i686.rpm expat-2.2.5-3.el8_1.2.x86_64.rpm expat-debuginfo-2.2.5-3.el8_1.2.i686.rpm expat-debuginfo-2.2.5-3.el8_1.2.x86_64.rpm expat-debugsource-2.2.5-3.el8_1.2.i686.rpm expat-debugsource-2.2.5-3.el8_1.2.x86_64.rpm expat-devel-2.2.5-3.el8_1.2.i686.rpm expat-devel-2.2.5-3.el8_1.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-40674 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYz7sntzjgjWX9erEAQilzg/9G0hBlNyYGAOEQ2Wd1hoaviKz1x8xQSjk 6Yp8hYteJ8barDPVG6ZSkOzK0EgwOU2BZem6D8s4jTF3SjYokQlC5qleON1kbV6v uegK8apoBsByZZVbpL3ioMcwT0jvoMJkmUhOrQmd8ijnWWBcQsmwVBCP8ej/YJcd ugtcxE9GIaXt/KCDg04ly+NaB21Ej2bvHC9IglajZyFglLESCs9aufQcEUIyyYN5 KHjLdIxmUvs61FsROSB4GH22OABH6v7JAZwIQB3bVr1HVSpU6eUU2ug+DN/sELtk 0wLZWTUk09V6I2uzF3Og40qsOUmgik5CSbeNrP5j/QAYz7Fys2HYs+ybx9zIMmlw t72+MCZO911IxV+CV2ev5qjluOgDcNDWJJVsvjSdiMpsK6d1xe7t224MYqHJLV5v 93fRMoL//MmF0OMcgNrR8ijooUq1WrxJBIjQQ+imyNezvjevYPnWcl2sfTJIBZAH UHblj3RmjTmg9qEl/hxsWqYO+7o7CqzJ49nPxAzvu/F6SKR56SRZwsZnLt/awXLD SfO2ff2jZA7Ruq5kvfspzh9EYlsz4117uRlm4jtYXCtnlsR43v3bDPw50oTEgTvm OJMkFOVAN5uVSPttPacD0JaIDpeV26ofSakXknA4+lwle9hP1enX5nQ3qkne06Dq 7vR0gnLs+t4=0lxG -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce