Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

expat-2.5.0-2.el9 RPM for x86_64

From CentOS Stream 9 BaseOS for x86_64

Name: expat Distribution: CentOS
Version: 2.5.0 Vendor: CentOS
Release: 2.el9 Build date: Wed Mar 20 14:33:58 2024
Group: Unspecified Build host: x86-03.stream.rdu2.redhat.com
Size: 309434 Source RPM: expat-2.5.0-2.el9.src.rpm
Packager: builder@centos.org
Url: https://libexpat.github.io/
Summary: An XML parser library
This is expat, the C library for parsing XML, written by James Clark. Expat
is a stream oriented XML parser. This means that you register handlers with
the parser prior to starting the parse. These handlers are called when the
parser discovers the associated structures in the document being parsed. A
start tag is an example of the kind of structures for which you may
register handlers.

Provides

Requires

License

MIT

Changelog

* Tue Feb 13 2024 Tomas Korbar <tkorbar@redhat.com> - 2.5.0-2
  - Fix parsing of large tokens
  - Reject direct parameter entity recursion
  - Resolves: RHEL-29699
  - Resolves: RHEL-29696
* Thu Nov 10 2022 Tomas Korbar <tkorbar@redhat.com> - 2.5.0-1
  - Rebase to version 2.5.0
  - Resolves: CVE-2022-43680
* Thu Sep 29 2022 Tomas Korbar <tkorbar@redhat.com> - 2.4.9-1
  - Rebase to version 2.4.9
  - Resolves: CVE-2022-40674
* Tue Apr 26 2022 Tomas Korbar <tkorbar@redhat.com> -  2.4.7-1
  - Rebase to version 2.4.7
  - Resolves: rhbz#2067201
  - Resolves: CVE-2022-25313
  - Resolves: CVE-2022-25314
  - Resolves: CVE-2022-25236
* Mon Mar 14 2022 Tomas Korbar <tkorbar@redhat.com> -  2.2.10-11
  - Improve fix for CVE-2022-25236
  - Related: CVE-2022-25236
* Mon Feb 28 2022 Tomas Korbar <tkorbar@redhat.com> -  2.2.10-10
  - Fix multiple CVEs
  - CVE-2022-25236 expat: namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution
  - CVE-2022-25235 expat: malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution
  - CVE-2022-25315 expat: integer overflow in storeRawNames()
  - Resolves: CVE-2022-25236
  - Resolves: CVE-2022-25235
  - Resolves: CVE-2022-25315

Files

/usr/bin/xmlwf
/usr/lib/.build-id
/usr/lib/.build-id/5d
/usr/lib/.build-id/5d/e7bfa269c7a8877c2159fb74ef51ae26ed9fcd
/usr/lib/.build-id/92
/usr/lib/.build-id/92/17d25c63de5978383348fdc7928733da945143
/usr/lib64/libexpat.so.1
/usr/lib64/libexpat.so.1.8.10
/usr/share/doc/expat
/usr/share/doc/expat/AUTHORS
/usr/share/doc/expat/Changes
/usr/share/licenses/expat
/usr/share/licenses/expat/COPYING
/usr/share/man/man1/xmlwf.1.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Dec 7 05:11:24 2024