First published: Sat Jan 08 2022(Updated: )
expat (libexpat) is susceptible to a software flaw that causes process interruption. When processing a large number of prefixed XML attributes on a single tag can libexpat can terminate unexpectedly due to integer overflow. The highest threat from this vulnerability is to availability, confidentiality and integrity.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <0:2.1.0-14.el7_9 | 0:2.1.0-14.el7_9 |
redhat/expat | <0:2.2.5-4.el8_5.3 | 0:2.2.5-4.el8_5.3 |
redhat/xmlrpc-c | <0:1.51.0-8.el8 | 0:1.51.0-8.el8 |
Libexpat Project Libexpat | <2.4.3 | |
Tenable Nessus | <8.15.3 | |
Tenable Nessus | >=10.0.0<10.1.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
redhat/expat | <2.4.3 | 2.4.3 |
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-22825 is a vulnerability in Expat (libexpat) before version 2.4.3, causing an integer overflow in the xmlparse.c file.
CVE-2022-22825 has a severity score of 8.8, which is considered high.
CVE-2022-22825 can lead to process interruption, affecting availability.
The recommended remedy for CVE-2022-22825 is to upgrade Expat (libexpat) to version 2.4.3.
Yes, you can find references for CVE-2022-22825 at the following links: [GitHub Pull Request](https://github.com/libexpat/libexpat/pull/539), [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2022/01/17/3), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2044482).