[CVE-2022-22822 to CVE-2022-22827, CVE-2022-25236] Security Fix: Expat XML Parser Vulnerabilities #33
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Vulnerabilities Fixed
CVE-2022-22822 to CVE-2022-22827
Type: Integer Overflow vulnerabilities in various functions Severity: High (CVSS 9.8)
Impact: Potential heap buffer overflow leading to arbitrary code execution Affected Functions:
addBinding (CVE-2022-22822)
build_model (CVE-2022-22823)
defineAttribute (CVE-2022-22824)
lookup (CVE-2022-22825)
nextScaffoldPart (CVE-2022-22826)
storeAtts (CVE-2022-22827)
CVE-2022-25236
Type: Namespace confusion vulnerability
Severity: High (CVSS 9.8)
Impact: Allows attackers to bypass application logic through crafted namespace URIs