Show plain JSON{"affected_release": [{"advisory": "RHSA-2022:6921", "cpe": "cpe:/o:redhat:rhel_els:6", "package": "expat-0:2.0.1-15.el6_10", "product_name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support", "release_date": "2022-10-12T00:00:00Z"}, {"advisory": "RHSA-2022:6967", "cpe": "cpe:/o:redhat:rhel_els:6", "package": "compat-expat1-0:1.95.8-9.el6_10", "product_name": "Red Hat Enterprise Linux 6 Extended Lifecycle Support", "release_date": "2022-10-17T00:00:00Z"}, {"advisory": "RHSA-2022:6834", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "expat-0:2.1.0-15.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:6997", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:102.3.0-7.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:6998", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:102.3.0-4.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7023", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:102.3.0-4.el8_6", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7024", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:102.3.0-7.el8_6", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2023:3068", "cpe": "cpe:/a:redhat:enterprise_linux:8::crb", "package": "mingw-expat-0:2.4.8-2.el8", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-05-16T00:00:00Z"}, {"advisory": "RHSA-2022:6878", "cpe": "cpe:/o:redhat:enterprise_linux:8", "package": "expat-0:2.2.5-8.el8_6.3", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2022-10-11T00:00:00Z"}, {"advisory": "RHSA-2022:7019", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:102.3.0-7.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7021", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:102.3.0-4.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:6833", "cpe": "cpe:/o:redhat:rhel_e4s:8.1", "package": "expat-0:2.2.5-3.el8_1.2", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:6996", "cpe": "cpe:/a:redhat:rhel_eus:8.2", "package": "thunderbird-0:102.3.0-4.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7022", "cpe": "cpe:/a:redhat:rhel_eus:8.2", "package": "firefox-0:102.3.0-7.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:6832", "cpe": "cpe:/o:redhat:rhel_eus:8.2", "package": "expat-0:2.2.5-3.el8_2.3", "product_name": "Red Hat Enterprise Linux 8.2 Extended Update Support", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:6995", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "thunderbird-0:102.3.0-4.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7025", "cpe": "cpe:/a:redhat:rhel_eus:8.4", "package": "firefox-0:102.3.0-7.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:6831", "cpe": "cpe:/o:redhat:rhel_eus:8.4", "package": "expat-0:2.2.5-4.el8_4.4", "product_name": "Red Hat Enterprise Linux 8.4 Extended Update Support", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:6838", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "expat-0:2.2.10-12.el9_0.3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:7020", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:102.3.0-7.el9_0", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:7026", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:102.3.0-4.el9_0", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2022-10-18T00:00:00Z"}, {"advisory": "RHSA-2022:6838", "cpe": "cpe:/o:redhat:enterprise_linux:9", "package": "expat-0:2.2.10-12.el9_0.3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2022-10-06T00:00:00Z"}, {"advisory": "RHSA-2022:8598", "cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8", "package": "redhat-virtualization-host-0:4.5.3-202211170828_8.6", "product_name": "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8", "release_date": "2022-11-22T00:00:00Z"}, {"advisory": "RHSA-2022:8841", "cpe": "cpe:/a:redhat:jboss_core_services:1", "package": "expat", "product_name": "Text-Only JBCS", "release_date": "2022-12-08T00:00:00Z"}], "bugzilla": {"description": "expat: a use-after-free in the doContent function in xmlparse.c", "id": "2130769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130769"}, "csaw": false, "cvss3": {"cvss3_base_score": "8.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-416", "details": ["libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.", "A vulnerability was found in expat. With this flaw, it is possible to create a situation in which parsing is suspended while substituting in an internal entity so that XML_ResumeParser directly uses the internalEntityProcessor as its processor. If the subsequent parse includes some unclosed tags, this will return without calling storeRawNames to ensure that the raw versions of the tag names are stored in memory other than the parse buffer itself. Issues occur if the parse buffer is changed or reallocated (for example, if processing a file line by line), problems occur. Using this vulnerability in the doContent function allows an attacker to triage a denial of service or potentially arbitrary code execution."], "mitigation": {"lang": "en:us", "value": "There is no known mitigation other than restricting applications using the expat library from processing XML content. Please update the affected packages as soon as possible."}, "name": "CVE-2022-40674", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Out of support scope", "package_name": "firefox:flatpak/firefox", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Out of support scope", "package_name": "thunderbird:flatpak/thunderbird", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "xmlrpc-c", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "firefox:flatpak/firefox", "product_name": "Red Hat Enterprise Linux 9"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Affected", "package_name": "thunderbird:flatpak/thunderbird", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2022-09-14T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2022-40674\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-40674\nhttps://blog.hartwork.org/posts/expat-2-4-9-released/\nhttps://github.com/advisories/GHSA-2vq2-xc55-3j5m"], "statement": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but a successful attack can not execute arbitrary code, or allow remote users to cause a denial of service because attack complexity is high and depends on conditions beyond the attacker's control.", "threat_severity": "Important"}