漏洞信息详情
Expat 输入验证错误漏洞
漏洞简介
Expat是一款使用C语言编写的快速流式XML解析器。
Expat 存在输入验证错误漏洞,该漏洞源于 storeRawNames 中存在整数溢出。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/libexpat/libexpat/pull/559
参考网址
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2022/02/19/1
来源:MISC
链接:https://github.com/libexpat/libexpat/pull/559
来源:DEBIAN
链接:https://www.debian.org/security/2022/dsa-5085
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20220303-0008/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
来源:cxsecurity.com
链接:https://cxsecurity.com/cveshow/CVE-2022-25315/
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2022-25315
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Expat-five-vulnerabilities-37608
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2022022109
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2022.0785.2
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2022-25315
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2022022411
受影响实体
暂无
补丁
- Expat 输入验证错误漏洞的修复措施<!--2022-2-18-->
还没有评论,来说两句吧...