Уязвимость CVE-2022-29824: Информация
Описание
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Важность: MEDIUM (6,5) Вектор: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Исправленные пакеты
Ссылки на рекомендации, решения и инструменты
Ссылка | Ресурс |
---|---|
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 |
|
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd |
|
https://gitlab.gnome.org/GNOME/libxslt/-/tags |
|
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab |
|
[debian-lts-announce] 20220516 [SECURITY] [DLA 3012-1] libxml2 security update |
|
DSA-5142 |
|
http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html |
|
https://security.netapp.com/advisory/ntap-20220715-0006/ |
|
N/A |
|
GLSA-202210-03 |
|
http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html |
|
FEDORA-2022-9136d646e4 | |
FEDORA-2022-be6d83642a | |
FEDORA-2022-f624aad735 |