Investigate vulnerability: CVE-2022-40674 in libexpat1-2.2.10-2+deb11u3
Issue created from vulnerability 58840121
Description:
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
- Severity: critical
- Confidence: unknown
Solution:
Upgrade libexpat1 to 2.2.10-2+deb11u4
Identifiers:
Links:
- https://github.com/libexpat/libexpat/pull/629
- https://github.com/libexpat/libexpat/pull/640
- https://nvd.nist.gov/vuln/detail/CVE-2022-40674
- https://www.debian.org/security/2022/dsa-5236
- https://lists.debian.org/debian-lts-announce/2022/09/msg00029.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674
- https://ubuntu.com/security/notices/USN-5638-1
- https://access.redhat.com/security/cve/CVE-2022-40674
- https://blog.hartwork.org/posts/expat-2-4-9-released/
- https://github.com/advisories/GHSA-2vq2-xc55-3j5m
- https://security.gentoo.org/glsa/202209-24
Scanner:
- Name: Trivy