First published: Sat Jan 08 2022(Updated: )
addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <0:2.1.0-14.el7_9 | 0:2.1.0-14.el7_9 |
redhat/expat | <0:2.2.5-4.el8_5.3 | 0:2.2.5-4.el8_5.3 |
redhat/xmlrpc-c | <0:1.51.0-8.el8 | 0:1.51.0-8.el8 |
debian/expat | <=2.4.2-1<=2.2.6-2+deb10u1<=2.2.6-2<=2.2.10-2 | 2.4.3-1 2.2.6-2+deb10u2 2.2.10-2+deb11u1 |
Libexpat Project Libexpat | <2.4.3 | |
Tenable Nessus | <8.15.3 | |
Tenable Nessus | >=10.0.0<10.1.1 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
redhat/expat | <2.4.3 | 2.4.3 |
Google Android | ||
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1 2.5.0-1+deb12u1 2.6.3-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-22822 is a vulnerability in the Expat library (libexpat) before version 2.4.3 that allows an integer overflow, leading to process interruption.
The severity of CVE-2022-22822 is critical with a CVSS score of 9.8.
The affected software includes Expat (libexpat) versions before 2.4.3, as well as other packages and distributions listed in the vulnerability description.
To fix CVE-2022-22822, it is recommended to update Expat (libexpat) to version 2.4.3 or apply the provided patches or remedies for the respective packages and distributions.
You can find more information about CVE-2022-22822 in the provided references: [link1](https://github.com/libexpat/libexpat/pull/539), [link2](http://www.openwall.com/lists/oss-security/2022/01/17/3), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2044458).