{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-29824","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2024-08-03T06:33:42.645Z","dateReserved":"2022-04-27T00:00:00.000Z","datePublished":"2022-05-03T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2022-11-14T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://gitlab.gnome.org/GNOME/libxslt/-/tags"},{"name":"FEDORA-2022-9136d646e4","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/"},{"name":"FEDORA-2022-be6d83642a","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/"},{"name":"[debian-lts-announce] 20220516 [SECURITY] [DLA 3012-1] libxml2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html"},{"name":"FEDORA-2022-f624aad735","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/"},{"name":"DSA-5142","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5142"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd"},{"url":"http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html"},{"url":"https://security.netapp.com/advisory/ntap-20220715-0006/"},{"name":"GLSA-202210-03","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202210-03"},{"url":"http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T06:33:42.645Z"},"title":"CVE Program Container","references":[{"url":"https://gitlab.gnome.org/GNOME/libxslt/-/tags","tags":["x_transferred"]},{"name":"FEDORA-2022-9136d646e4","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/"},{"name":"FEDORA-2022-be6d83642a","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/"},{"name":"[debian-lts-announce] 20220516 [SECURITY] [DLA 3012-1] libxml2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html"},{"name":"FEDORA-2022-f624aad735","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/"},{"name":"DSA-5142","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5142"},{"url":"https://www.oracle.com/security-alerts/cpujul2022.html","tags":["x_transferred"]},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14","tags":["x_transferred"]},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab","tags":["x_transferred"]},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20220715-0006/","tags":["x_transferred"]},{"name":"GLSA-202210-03","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202210-03"},{"url":"http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html","tags":["x_transferred"]}]}]}}