Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2022-29824
Description:In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Test IDs: 1.3.6.1.4.1.25623.1.0.820453   1.3.6.1.4.1.25623.1.0.820507   1.3.6.1.4.1.25623.1.1.2.2022.1938   1.3.6.1.4.1.25623.1.0.820576   1.3.6.1.4.1.25623.1.1.2.2022.2093   1.3.6.1.4.1.25623.1.1.2.2022.2113   1.3.6.1.4.1.25623.1.1.2.2022.1901   1.3.6.1.4.1.25623.1.1.2.2022.2354   1.3.6.1.4.1.25623.1.1.2.2022.2162   1.3.6.1.4.1.25623.1.0.705142   1.3.6.1.4.1.25623.1.1.2.2022.2390   1.3.6.1.4.1.25623.1.1.2.2022.2002   1.3.6.1.4.1.25623.1.1.2.2022.2622   1.3.6.1.4.1.25623.1.1.2.2022.1972   1.3.6.1.4.1.25623.1.0.893012   1.3.6.1.4.1.25623.1.1.13.2022.122.01   1.3.6.1.4.1.25623.1.1.2.2022.2137   1.3.6.1.4.1.25623.1.1.10.2022.0177  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2022-29824
https://security.netapp.com/advisory/ntap-20220715-0006/
Debian Security Information: DSA-5142 (Google Search)
https://www.debian.org/security/2022/dsa-5142
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://security.gentoo.org/glsa/202210-03
http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html




© 1998-2025 E-Soft Inc. All rights reserved.