vulnerability
Red Hat: CVE-2022-25235: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Feb 16, 2022 | Mar 11, 2022 | Aug 11, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Feb 16, 2022
Added
Mar 11, 2022
Modified
Aug 11, 2025
Description
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-expatredhat-upgrade-expat-debuginforedhat-upgrade-expat-debugsourceredhat-upgrade-expat-develredhat-upgrade-expat-staticredhat-upgrade-firefoxredhat-upgrade-firefox-debuginforedhat-upgrade-firefox-debugsourceredhat-upgrade-mingw32-expatredhat-upgrade-mingw32-expat-debuginforedhat-upgrade-mingw64-expatredhat-upgrade-mingw64-expat-debuginforedhat-upgrade-thunderbirdredhat-upgrade-thunderbird-debuginforedhat-upgrade-thunderbird-debugsourceredhat-upgrade-xmlrpc-credhat-upgrade-xmlrpc-c-apps-debuginforedhat-upgrade-xmlrpc-c-credhat-upgrade-xmlrpc-c-c-debuginforedhat-upgrade-xmlrpc-c-clientredhat-upgrade-xmlrpc-c-client-debuginforedhat-upgrade-xmlrpc-c-debuginforedhat-upgrade-xmlrpc-c-debugsourceredhat-upgrade-xmlrpc-c-devel
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.