In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:33:42.645Z

Reserved: 2022-04-27T00:00:00

Link: CVE-2022-29824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-03T03:15:06.687

Modified: 2024-11-21T06:59:45.417

Link: CVE-2022-29824

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-05-03T00:00:00Z

Links: CVE-2022-29824 - Bugzilla

cve-icon OpenCVE Enrichment

No data.