An XML parser library
6c4005223e
CVE-2022-25236 expat: namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution CVE-2022-25235 expat: malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution CVE-2022-25315 expat: integer overflow in storeRawNames() Resolves: CVE-2022-25236 Resolves: CVE-2022-25235 Resolves: CVE-2022-25315 |
||
---|---|---|
tests | ||
.gitignore | ||
expat-2.2.10-Add-missing-validation-of-encoding.patch | ||
expat-2.2.10-Detect-and-prevent-integer-overflow-in-XML_GetBuffer.patch | ||
expat-2.2.10-Detect-and-prevent-troublesome-left-shifts.patch | ||
expat-2.2.10-prevent-integer-overflow-in-doProlog.patch | ||
expat-2.2.10-Prevent-integer-overflow-in-storeRawNames.patch | ||
expat-2.2.10-Prevent-integer-overflow-on-m_groupSize-in-function.patch | ||
expat-2.2.10-Prevent-more-integer-overflows.patch | ||
expat-2.2.10-Protect-against-malicious-namespace-declarations.patch | ||
expat.spec | ||
gating.yaml | ||
sources |