First published: Fri Feb 18 2022(Updated: )
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mingw-expat | <0:2.4.8-1.el8 | 0:2.4.8-1.el8 |
redhat/expat | <0:2.2.5-8.el8_6.2 | 0:2.2.5-8.el8_6.2 |
redhat/expat | <0:2.2.10-12.el9_0.2 | 0:2.2.10-12.el9_0.2 |
debian/expat | 2.2.6-2+deb10u4 2.2.6-2+deb10u6 2.2.10-2+deb11u5 2.5.0-1 2.5.0-2 | |
redhat/expat | <2.4.5 | 2.4.5 |
Android | ||
Debian (libexpat1) | <2.4.5 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =34 | |
Fedora | =35 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 | |
Siemens SINEMA Remote Connect | <3.1 |
There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25314 is a vulnerability in Expat (aka libexpat) before 2.4.5 that involves an integer overflow in copyString.
The severity of CVE-2022-25314 is high, with a severity value of 7.5.
CVE-2022-25314 affects the encoding name parameter at the parser creation time in expat, potentially causing a denial of service.
To fix CVE-2022-25314, update Expat to version 2.4.5 or newer.
More information about CVE-2022-25314 can be found in the references: [1] [2] [3].