libexpat.so is vulnerable to use-after-free. The vulnerability exists due to a lack of entity value validations in the XML_ParserFree
parameter of the parserCreate
function in xmlparse.c
. An attacker could exploit it to lead to memory consumption resulting in an application crash.
github.com/advisories/GHSA-4hjv-8mmr-jxwv
github.com/libexpat/libexpat/commit/5290462a7ea1278a8d5c0d5b2860d4e244f997e4
github.com/libexpat/libexpat/issues/649
github.com/libexpat/libexpat/pull/616
github.com/libexpat/libexpat/pull/650
lists.debian.org/debian-lts-announce/2022/10/msg00033.html
lists.fedoraproject.org/archives/list/[email protected]/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
lists.fedoraproject.org/archives/list/[email protected]/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
lists.fedoraproject.org/archives/list/[email protected]/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/
lists.fedoraproject.org/archives/list/[email protected]/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/
lists.fedoraproject.org/archives/list/[email protected]/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
lists.fedoraproject.org/archives/list/[email protected]/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/
security.gentoo.org/glsa/202210-38
security.netapp.com/advisory/ntap-20221118-0007/
www.debian.org/security/2022/dsa-5266