First published: Wed Jan 26 2022(Updated: )
A flaw was found in expat. The vulnerability occurs due to large content in element type declarations when there is an element declaration handler present which leads to an integer overflow. This flaw allows an attacker to inject an unsigned integer, leading to a crash or a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mingw-expat | <0:2.4.8-1.el8 | 0:2.4.8-1.el8 |
Libexpat Project Libexpat | <2.4.4 | |
Tenable Nessus | <8.15.3 | |
Tenable Nessus | >=10.0.0<10.1.1 | |
Oracle Communications Metasolv Solution | =6.3.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
redhat/expat | <2.4.4 | 2.4.4 |
Google Android | ||
debian/expat | 2.2.10-2+deb11u5 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.6.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-23990.
The severity of CVE-2022-23990 is high with a severity value of 7.5.
The affected software of CVE-2022-23990 includes expat, mingw-expat, Ubuntu expat, Firefox, Debian expat, Tenable Nessus, Oracle Communications Metasolv Solution, Google Android, Siemens SINEMA Remote Connect Server, and Fedora.
To fix CVE-2022-23990 on Red Hat, update expat to version 2.4.4 or later.
Yes, you can find references for CVE-2022-23990 at the following links: [GitHub](https://github.com/libexpat/libexpat/pull/551), [Red Hat Bugzilla 1](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2050215), [Red Hat Bugzilla 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2050214).