First published: Fri Feb 18 2022(Updated: )
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Libexpat Project Libexpat | <2.4.5 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
redhat/mingw-expat | <0:2.4.8-1.el8 | 0:2.4.8-1.el8 |
redhat/expat | <0:2.2.5-8.el8_6.2 | 0:2.2.5-8.el8_6.2 |
redhat/expat | <0:2.2.10-12.el9_0.2 | 0:2.2.10-12.el9_0.2 |
debian/expat | 2.2.6-2+deb10u4 2.2.6-2+deb10u6 2.2.10-2+deb11u5 2.5.0-1 2.5.0-2 |
There is no known mitigation other than restricting applications using the expat library from processing untrusted XML content.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-25314 is a vulnerability in Expat (aka libexpat) before 2.4.5 that involves an integer overflow in copyString.
The severity of CVE-2022-25314 is high, with a severity value of 7.5.
CVE-2022-25314 affects the encoding name parameter at the parser creation time in expat, potentially causing a denial of service.
To fix CVE-2022-25314, update Expat to version 2.4.5 or newer.
More information about CVE-2022-25314 can be found in the references: [1] [2] [3].