libexpat.so is vulnerable to denial of service. The vulnerability exists due to the integer overflow in the copyString
function of xmlparse.c
as it is only used for encoding strings supplied by the library user, allowing an attacker to cause an application crash.
CPE | Name | Operator | Version |
---|---|---|---|
expat:sid | eq | 2.2.10-1 | |
expat:sid | eq | 2.4.1-2 | |
libexpat.so | le | 1.8.4 | |
expat | eq | 2.1 | |
expat:edge | eq | 2.4.2-r0 | |
expat:edge | eq | 2.4.3-r0 | |
expat:edge | eq | 2.2.9-r1 | |
expat:edge | eq | 2.4.1-r0 | |
expat:edge | eq | 2.2.10-r1 | |
expat:edge | eq | 2.3.0-r0 |
www.openwall.com/lists/oss-security/2022/02/19/1
cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
github.com/libexpat/libexpat/commit/efcb347440ade24b9f1054671e6bd05e60b4cafd
github.com/libexpat/libexpat/pull/560
lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
security-tracker.debian.org/tracker/CVE-2022-25314
security.gentoo.org/glsa/202209-24
security.netapp.com/advisory/ntap-20220303-0008/
www.debian.org/security/2022/dsa-5085
www.openwall.com/lists/oss-security/2022/02/19/1
www.oracle.com/security-alerts/cpuapr2022.html