libexpat.so is vulnerable to denial of service. An attacker can trigger stack exhaustion in the build_model
function of xmlparse.c
via a large nesting depth in the DTD
element, leading to an application crash
CPE | Name | Operator | Version |
---|---|---|---|
expat:sid | eq | 2.2.10-1 | |
expat:sid | eq | 2.4.1-2 | |
libexpat.so | le | 1.8.4 | |
expat | eq | 2.1 | |
expat:edge | eq | 2.4.2-r0 | |
expat:edge | eq | 2.4.3-r0 | |
expat:edge | eq | 2.2.9-r1 | |
expat:edge | eq | 2.4.1-r0 | |
expat:edge | eq | 2.2.10-r1 | |
expat:edge | eq | 2.3.0-r0 |
www.openwall.com/lists/oss-security/2022/02/19/1
cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
github.com/libexpat/libexpat/commit/9b4ce651b26557f16103c3a366c91934ecd439ab
github.com/libexpat/libexpat/pull/558
lists.debian.org/debian-lts-announce/2022/03/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
security-tracker.debian.org/tracker/CVE-2022-25313
security.gentoo.org/glsa/202209-24
security.netapp.com/advisory/ntap-20220303-0008/
www.debian.org/security/2022/dsa-5085
www.openwall.com/lists/oss-security/2022/02/19/1
www.oracle.com/security-alerts/cpuapr2022.html