Name | CVE-2022-29824 |
Description | In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3012-1, DSA-5142-1, ELA-617-1 |
Debian Bugs | 1010526 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
libxml2 (PTS) | jessie, jessie (lts) | 2.9.1+dfsg1-5+deb8u17 | fixed |
stretch (security) | 2.9.4+dfsg1-2.2+deb9u7 | fixed | |
stretch (lts), stretch | 2.9.4+dfsg1-2.2+deb9u11 | fixed | |
buster, buster (lts) | 2.9.4+dfsg1-7+deb10u9 | fixed | |
buster (security) | 2.9.4+dfsg1-7+deb10u6 | fixed | |
bullseye | 2.9.10+dfsg-6.7+deb11u4 | fixed | |
bullseye (security) | 2.9.10+dfsg-6.7+deb11u5 | fixed | |
bookworm | 2.9.14+dfsg-1.3~deb12u1 | fixed | |
sid, trixie | 2.12.7+dfsg+really2.9.14-0.2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
libxml2 | source | jessie | 2.9.1+dfsg1-5+deb8u13 | ELA-617-1 | ||
libxml2 | source | stretch | 2.9.4+dfsg1-2.2+deb9u7 | DLA-3012-1 | ||
libxml2 | source | buster | 2.9.4+dfsg1-7+deb10u4 | DSA-5142-1 | ||
libxml2 | source | bullseye | 2.9.10+dfsg-6.7+deb11u2 | DSA-5142-1 | ||
libxml2 | source | (unstable) | 2.9.14+dfsg-1 | 1010526 |
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2272