First published: Sat Jan 08 2022(Updated: )
build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <0:2.1.0-14.el7_9 | 0:2.1.0-14.el7_9 |
redhat/expat | <0:2.2.5-4.el8_5.3 | 0:2.2.5-4.el8_5.3 |
redhat/xmlrpc-c | <0:1.51.0-8.el8 | 0:1.51.0-8.el8 |
Libexpat Project Libexpat | <2.4.3 | |
Tenable Nessus | <8.15.3 | |
Tenable Nessus | >=10.0.0<10.1.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
redhat/expat | <2.4.3 | 2.4.3 |
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-22823 is a vulnerability in the Expat library (libexpat) before version 2.4.3 that allows an integer overflow, leading to process interruption.
The severity of CVE-2022-22823 is critical with a CVSS score of 9.8.
The affected software includes Expat (libexpat) versions before 2.4.3, and specific versions of Tenable Nessus, xmlrpc-c, Debian Linux, Siemens SINEMA Remote Connect Server, and various Ubuntu packages (libxmltok, expat, firefox, thunderbird).
The remedy for CVE-2022-22823 in Expat (libexpat) is to update to version 2.4.3.
You can find more information about CVE-2022-22823 at the following references: [GitHub](https://github.com/libexpat/libexpat/pull/539), [Openwall](http://www.openwall.com/lists/oss-security/2022/01/17/3), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2044465).