libexpat 资源管理错误漏洞(CVE-2022-40674)

admin 2023-11-30 06:01:13 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 libexpat 资源管理错误漏洞(CVE-2022-40674)

CVE编号

CVE-2022-40674

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-14
漏洞描述
libexpat是一款使用C语言编写的流式XML解析器。 libexpat 2.4.9之前的版本存在安全漏洞,该漏洞源于其xmlparse.c组件中的doContent函数存在释放后重用。
解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://github.com/libexpat/libexpat/commit/a976e32abd257728a51dc55cf3d4ebee5b853459
参考链接
https://github.com/libexpat/libexpat/pull/629
https://github.com/libexpat/libexpat/pull/640
https://lists.debian.org/debian-lts-announce/2022/09/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://lists.fedoraproject.org/archives/list/[email protected]...
https://security.gentoo.org/glsa/202209-24
https://security.gentoo.org/glsa/202211-06
https://security.netapp.com/advisory/ntap-20221028-0008/
https://www.debian.org/security/2022/dsa-5236
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 libexpat_project libexpat * Up to (excluding) 2.4.9
运行在以下环境
系统 alibaba_cloud_linux_2.1903 expat-static * Up to (excluding) 2.1.0-15.1.al7
运行在以下环境
系统 alpine_3.13 expat * Up to (excluding) 2.2.10-r7
运行在以下环境
系统 alpine_3.14 expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 alpine_3.15 expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 alpine_3.16 expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 alpine_3.17 expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 alpine_3.18 expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 alpine_edge expat * Up to (excluding) 2.4.9-r0
运行在以下环境
系统 amazon_2 expat * Up to (excluding) 102.4.0-1.amzn2.0.1
运行在以下环境
系统 amazon_2022 expat * Up to (excluding) 2.4.9-1.amzn2022.0.1
运行在以下环境
系统 amazon_2023 expat * Up to (excluding) 2.5.0-1.amzn2023.0.2
运行在以下环境
系统 amazon_AMI expat * Up to (excluding) 2.1.0-15.32.amzn1
运行在以下环境
系统 anolis_os_7 firefox * Up to (excluding) 2.1.0-15
运行在以下环境
系统 anolis_os_8 firefox * Up to (excluding) 2.4.8-2
运行在以下环境
系统 centos_7 expat * Up to (excluding) 102.3.0-4.el7_9
运行在以下环境
系统 centos_8 firefox-debugsource * Up to (excluding) 102.3.0-4.el8_6
运行在以下环境
系统 debian_10 expat * Up to (excluding) 2.2.6-2+deb10u5
运行在以下环境
系统 debian_11 expat * Up to (excluding) 2.2.10-2+deb11u4
运行在以下环境
系统 debian_12 expat * Up to (excluding) 2.4.8-2
运行在以下环境
系统 debian_sid expat * Up to (excluding) 2.4.8-2
运行在以下环境
系统 fedora_35 expat-devel * Up to (excluding) 2.4.9-1.fc35
运行在以下环境
系统 fedora_36 expat-devel * Up to (excluding) 2.4.9-1.fc36
运行在以下环境
系统 fedora_37 mingw64-expat * Up to (excluding) 2.4.9-1.fc37
运行在以下环境
系统 kylinos_aarch64_V10 firefox * Up to (excluding) 2.1.0-15.el7_9
运行在以下环境
系统 kylinos_aarch64_V10SP1 expat * Up to (excluding) 2.2.9-8.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 expat * Up to (excluding) 2.2.9-8.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 firefox * Up to (excluding) 2.2.9-9.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 expat * Up to (excluding) 2.2.9-8.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 expat * Up to (excluding) 2.2.9-9.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 firefox * Up to (excluding) 2.1.0-15.el7_9
运行在以下环境
系统 kylinos_x86_64_V10SP1 expat * Up to (excluding) 2.2.9-8.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 expat * Up to (excluding) 2.2.9-8.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 firefox * Up to (excluding) 2.2.9-9.ky10
运行在以下环境
系统 opensuse_5.2 libexpat1 * Up to (excluding) 2.2.5-150000.3.22.1
运行在以下环境
系统 opensuse_Leap_15.3 libexpat1 * Up to (excluding) 2.2.5-150000.3.22.1
运行在以下环境
系统 opensuse_Leap_15.4 libexpat1 * Up to (excluding) 2.4.4-150400.3.9.1
运行在以下环境
系统 oracle_6 oraclelinux-release * Up to (excluding) 2.0.1-13.0.2.el6_8
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 2.1.0-15.0.1.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 2.2.5-8.0.1.el8_6.3
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 2.2.10-12.el9_0.3
运行在以下环境
系统 redhat_6 expat * Up to (excluding) 0:2.0.1-15.el6_10
运行在以下环境
系统 redhat_7 thunderbird * Up to (excluding) 2.1.0-15.el7_9
运行在以下环境
系统 redhat_8 firefox-debugsource * Up to (excluding) 102.3.0-4.el8_6
运行在以下环境
系统 redhat_9 firefox-debugsource * Up to (excluding) 102.3.0-4.el9_0
运行在以下环境
系统 suse_12_SP5 libexpat1-32bit * Up to (excluding) 2.1.0-21.25.1
运行在以下环境
系统 ubuntu_18.04 expat * Up to (excluding) 2.2.5-3ubuntu0.8
运行在以下环境
系统 ubuntu_20.04 expat * Up to (excluding) 2.2.9-1ubuntu0.5
运行在以下环境
系统 ubuntu_22.04 expat * Up to (excluding) 2.4.7-1ubuntu0.1
运行在以下环境
系统 ubuntu_22.10 expat * Up to (excluding) 2.4.8-2
运行在以下环境
系统 unionos_a expat * Up to (excluding) thunderbird-102.3.0-3.uelc20.02
运行在以下环境
系统 unionos_d expat * Up to (excluding) 2.2.6.3-2+deepin
运行在以下环境
系统 unionos_e expat * Up to (excluding) 79.0-9.up1.uel20
阿里云评分 6.8
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-416 释放后使用
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0