Bug 1194478 - (CVE-2022-22825) VUL-0: CVE-2022-22825: expat: integer overflow in lookup in xmlparse.c
(CVE-2022-22825)
VUL-0: CVE-2022-22825: expat: integer overflow in lookup in xmlparse.c
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/319793/
CVSSv3.1:SUSE:CVE-2022-22825:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-01-10 15:10 UTC by Carlos López
Modified: 2022-06-09 13:38 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-01-10 15:10:09 UTC
CVE-2022-22825

An integer overflow in lookup in xmlparse.c can lead to allocation misbehavior.

Upstream fix:
https://github.com/libexpat/libexpat/pull/539/
Comment 5 Swamp Workflow Management 2022-01-25 17:25:46 UTC
SUSE-SU-2022:0178-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1194251,1194362,1194474,1194476,1194477,1194478,1194479,1194480
CVE References: CVE-2021-45960,CVE-2021-46143,CVE-2022-22822,CVE-2022-22823,CVE-2022-22824,CVE-2022-22825,CVE-2022-22826,CVE-2022-22827
JIRA References: 
Sources used:
SUSE MicroOS 5.1 (src):    expat-2.2.5-3.9.1
SUSE MicroOS 5.0 (src):    expat-2.2.5-3.9.1
SUSE Manager Server 4.1 (src):    expat-2.2.5-3.9.1
SUSE Manager Retail Branch Server 4.1 (src):    expat-2.2.5-3.9.1
SUSE Manager Proxy 4.1 (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server for SAP 15 (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Server 15-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    expat-2.2.5-3.9.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    expat-2.2.5-3.9.1
SUSE Enterprise Storage 7 (src):    expat-2.2.5-3.9.1
SUSE Enterprise Storage 6 (src):    expat-2.2.5-3.9.1
SUSE CaaS Platform 4.0 (src):    expat-2.2.5-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2022-01-25 17:32:57 UTC
openSUSE-SU-2022:0178-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1194251,1194362,1194474,1194476,1194477,1194478,1194479,1194480
CVE References: CVE-2021-45960,CVE-2021-46143,CVE-2022-22822,CVE-2022-22823,CVE-2022-22824,CVE-2022-22825,CVE-2022-22826,CVE-2022-22827
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    expat-2.2.5-3.9.1
Comment 7 Swamp Workflow Management 2022-01-25 17:34:56 UTC
SUSE-SU-2022:14878-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1194251,1194362,1194474,1194476,1194477,1194478,1194479,1194480
CVE References: CVE-2021-45960,CVE-2021-46143,CVE-2022-22822,CVE-2022-22823,CVE-2022-22824,CVE-2022-22825,CVE-2022-22826,CVE-2022-22827
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    expat-2.0.1-88.42.12.1
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    expat-2.0.1-88.42.12.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    expat-2.0.1-88.42.12.1
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    expat-2.0.1-88.42.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2022-01-25 17:40:57 UTC
SUSE-SU-2022:0179-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1194251,1194362,1194474,1194476,1194477,1194478,1194479,1194480
CVE References: CVE-2021-45960,CVE-2021-46143,CVE-2022-22822,CVE-2022-22823,CVE-2022-22824,CVE-2022-22825,CVE-2022-22826,CVE-2022-22827
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    expat-2.1.0-21.12.1
SUSE OpenStack Cloud Crowbar 8 (src):    expat-2.1.0-21.12.1
SUSE OpenStack Cloud 9 (src):    expat-2.1.0-21.12.1
SUSE OpenStack Cloud 8 (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server 12-SP5 (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    expat-2.1.0-21.12.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    expat-2.1.0-21.12.1
HPE Helion Openstack 8 (src):    expat-2.1.0-21.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 David Anes 2022-01-26 15:08:13 UTC
All done. Assigning back to security team.
Comment 12 Carlos López 2022-06-09 13:37:50 UTC
Done, closing.