First published: Sat Jan 08 2022(Updated: )
expat (libexpat) is susceptible to a software flaw that causes process interruption. When processing a large number of prefixed XML attributes on a single tag can libexpat can terminate unexpectedly due to integer overflow. The highest threat from this vulnerability is to availability, confidentiality and integrity.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/expat | <0:2.1.0-14.el7_9 | 0:2.1.0-14.el7_9 |
redhat/expat | <0:2.2.5-4.el8_5.3 | 0:2.2.5-4.el8_5.3 |
redhat/xmlrpc-c | <0:1.51.0-8.el8 | 0:1.51.0-8.el8 |
Libexpat Project Libexpat | <2.4.3 | |
Tenable Nessus | <8.15.3 | |
Tenable Nessus | >=10.0.0<10.1.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
redhat/expat | <2.4.3 | 2.4.3 |
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-22827 is a vulnerability in Expat (libexpat) before version 2.4.3 that allows an integer overflow and can cause process interruption.
The severity of CVE-2022-22827 is high, with a CVSS score of 8.8.
CVE-2022-22827 affects Expat (libexpat) versions before 2.4.3.
The highest threat from CVE-2022-22827 is to availability and confidentiality.
To fix CVE-2022-22827, update Expat (libexpat) to version 2.4.3.