Unrated severityNVD Advisory· Published Sep 14, 2022· Updated May 30, 2025
CVE-2022-40674
CVE-2022-40674
Description
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
Affected products
54- libexpat/libexpatdescription
- osv-coords53 versionspkg:apk/chainguard/expatpkg:apk/chainguard/expat-devpkg:apk/chainguard/expat-docpkg:apk/chainguard/libexpat1pkg:apk/wolfi/expatpkg:apk/wolfi/expat-devpkg:apk/wolfi/expat-docpkg:apk/wolfi/libexpat1pkg:rpm/almalinux/expatpkg:rpm/almalinux/expat-develpkg:rpm/almalinux/firefoxpkg:rpm/almalinux/mingw32-expatpkg:rpm/almalinux/mingw64-expatpkg:rpm/almalinux/thunderbirdpkg:rpm/opensuse/expat&distro=openSUSE%20Leap%2015.3pkg:rpm/opensuse/expat&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/expat&distro=openSUSE%20Leap%20Micro%205.2pkg:rpm/opensuse/expat&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/suse/expat&distro=SUSE%20Enterprise%20Storage%206pkg:rpm/suse/expat&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-ESPOSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP3pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCLpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-BCLpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/expat&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/expat&distro=SUSE%20Manager%20Proxy%204.1pkg:rpm/suse/expat&distro=SUSE%20Manager%20Retail%20Branch%20Server%204.1pkg:rpm/suse/expat&distro=SUSE%20Manager%20Server%204.1pkg:rpm/suse/expat&distro=SUSE%20OpenStack%20Cloud%209pkg:rpm/suse/expat&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209
< 0+ 52 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 2.2.10-12.el9_0.3
- (no CPE)range: < 2.2.10-12.el9_0.3
- (no CPE)range: < 102.3.0-7.el9_0.alma
- (no CPE)range: < 2.4.8-2.el8
- (no CPE)range: < 2.4.8-2.el8
- (no CPE)range: < 102.3.0-4.el8_6.alma
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.4.4-150400.3.9.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.4.9-1.1
- (no CPE)range: < 128.5.1-1.1
- (no CPE)range: < 107.0-1.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.4.4-150400.3.9.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.4.4-150400.3.9.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.2.5-150000.3.22.1
- (no CPE)range: < 2.1.0-21.25.1
- (no CPE)range: < 2.1.0-21.25.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2IGJNHFV53PYST7VQV3T4NHVYAMXA36/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG/mitrevendor-advisory
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/mitrevendor-advisory
- security.gentoo.org/glsa/202209-24mitrevendor-advisory
- security.gentoo.org/glsa/202211-06mitrevendor-advisory
- www.debian.org/security/2022/dsa-5236mitrevendor-advisory
- lists.debian.org/debian-lts-announce/2022/09/msg00029.htmlmitremailing-list
- github.com/libexpat/libexpat/pull/629mitre
- github.com/libexpat/libexpat/pull/640mitre
- security.netapp.com/advisory/ntap-20221028-0008/mitre
News mentions
0No linked articles in our index yet.