linux.oracle.com Open in urlscan Pro
2a02:26f0:1700:388::a15  Public Scan

URL: https://linux.oracle.com/cve/CVE-2022-43680.html
Submission: On July 05 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

Oracle
 * ULN
 * Support
 * Documentation
 * Downloads

STAY CONNECTED:

 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Blog


CVE-2022-43680

 * ULN > 
 * Oracle Linux CVE repository  > 
 * CVE-2022-43680


CVE DETAILS

Release Date:2022-10-24


DESCRIPTION


In libexpat through 2.4.9, there is a use-after free caused by overeager
destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory
situations.

See more information about CVE-2022-43680 from MITRE CVE dictionary and NIST NVD



CVSS V3.0 METRICS


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and
subject to review.

Base Score: 7.5 Base Metrics: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Access Vector:
Network Attack Complexity: Low Privileges Required: None User Interaction: None
Scope: Unchanged Confidentiality Impact: None Integrity Impact: None
Availability Impact: High



ERRATA INFORMATION


PlatformErrataRelease Date Oracle Linux version 8
(expat)ELSA-2023-01032023-01-12Oracle Linux version 9
(expat)ELSA-2023-03372023-01-24




This page is generated automatically and has not been checked for errors or
omissions. For clarification or corrections please contact the Oracle Linux ULN
team


TECHNICAL INFORMATION

 * Oracle Linux Certified Hardware
 * Oracle Linux Supported Releases


ORACLE LINUX SUPPORT

 * Oracle Linux Support
 * Oracle Premier Support for Systems
 * Advanced Customer Services


CONNECT

 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Blog


CONTACT US

 * Global contacts
 * Oracle 1-800-633-0691

Subscribe | Careers | Contact Us | Legal Notices | Terms of Use | Your Privacy
Rights