libexpat.so is vulnerable to integer overflow. The vulnerability exists in the doProlog
function in the xmlparse.c
file, allowing an attacker to cause an application crash.
cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
github.com/libexpat/libexpat/commit/5c168279c5ad4668e5e48fe13374fe7a7de4b573
github.com/libexpat/libexpat/pull/551
lists.fedoraproject.org/archives/list/[email protected]/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
lists.fedoraproject.org/archives/list/[email protected]/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
security.gentoo.org/glsa/202209-24
www.debian.org/security/2022/dsa-5073
www.oracle.com/security-alerts/cpuapr2022.html
www.tenable.com/security/tns-2022-05