First published: Fri Aug 30 2024(Updated: )
An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1 | |
Libexpat | <2.6.3 | |
debian/expat | <=2.2.10-2+deb11u5 | 2.2.10-2+deb11u6 2.5.0-1+deb12u1 2.7.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-45492 is classified with a severity that indicates a significant risk due to the integer overflow vulnerability in libexpat.
To fix CVE-2024-45492, upgrade libexpat to version 2.6.3 or later.
CVE-2024-45492 affects all versions of libexpat prior to 2.6.3.
As of now, there is no public information available indicating that CVE-2024-45492 is actively being exploited in the wild.
CVE-2024-45492 primarily affects 32-bit platforms due to the integer overflow issue in libexpat.