[CLSA-2022:1664192553] Fix CVE(s): CVE-2022-40674
Type:
security
Severity:
Critical
Release date:
2022-09-26 11:42:33 UTC
Description:
* SECURITY UPDATE: Unsafe exiting internalEntityParser - debian/patches/CVE-2022-40674.patch: Ensure raw tagnames are safe exiting internalEntityParser - CVE-2022-40674 * tests were activated * some leaks fixed: - debian/patches/fix-leak-xmlparse.patch: tidy up attribute prefix bindings on error (fixes #17) - debian/patches/fix-tests-leak.patch: free the external entity parser in external_entity_loader_set_encoding() - debian/patches/fix-tests-leak2.patch: free the content model in dummy_element_decl_handler() - debian/patches/dispose-test-stuff.patch: removes some of the memory leaks discovered by AddressSanitizer in the test suite (Issue #23)
Updated packages:
  • expat_2.1.0-7ubuntu0.16.04.5+tuxcare.els2_amd64.deb
    sha:eb4834174a039ca1bac8398ad2f992fb272469a6
  • libexpat1_2.1.0-7ubuntu0.16.04.5+tuxcare.els2_amd64.deb
    sha:2cad8402d84e8381b68993a92991a8ad9ec3c240
  • libexpat1-dev_2.1.0-7ubuntu0.16.04.5+tuxcare.els2_amd64.deb
    sha:63ed6fd400ef8b8c0d432151f7bc2b1d27bb6b7c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.