CVE-2022-29824

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
VendorProductVersion
xmlsoftlibxml2
𝑥
< 2.9.14
xmlsoftlibxslt
𝑥
≤ 1.1.35
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
netappactive_iq_unified_manager
-
netappclustered_data_ontap
-
netappclustered_data_ontap_antivirus_connector
-
netappmanageability_software_development_kit
-
netappontap_select_deploy_administration_utility
-
netappsmi-s_provider
-
netappsnapdrive
-
netappsnapmanager
-
netappsolidfire_\&_hci_management_node
-
oraclezfs_storage_appliance_kit
8.8
netapph300s_firmware
-
netapph500s_firmware
-
netapph700s_firmware
-
netapph410s_firmware
-
netapph410c_firmware
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
2.9.10+dfsg-6.7+deb11u4
fixed
bullseye (security)
2.9.10+dfsg-6.7+deb11u5
fixed
bookworm
2.9.14+dfsg-1.3~deb12u1
fixed
sid
2.12.7+dfsg+really2.9.14-0.1
fixed
trixie
2.12.7+dfsg+really2.9.14-0.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libxml2
jammy
Fixed 2.9.13+dfsg-1ubuntu0.1
released
impish
Fixed 2.9.12+dfsg-4ubuntu0.2
released
focal
Fixed 2.9.10+dfsg-5ubuntu0.20.04.3
released
bionic
Fixed 2.9.4+dfsg1-6.1ubuntu1.6
released
xenial
Fixed 2.9.3+dfsg1-1ubuntu0.7+esm2
released
trusty
Fixed 2.9.1+dfsg1-3ubuntu4.13+esm3
released
References