Mageia 2022-0177: libxml2 security update
Summary
In libxml2 before 2.9.14, several buffer handling functions in buf.c
(xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This
can result in out-of-bounds memory writes. Exploitation requires a victim
to open a crafted, multi-gigabyte XML file. Other software using libxml2's
buffer functions, for example libxslt through 1.1.35, is affected as well.
(CVE-2022-29824)
References
- https://bugs.mageia.org/show_bug.cgi?id=30394
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
Resolution
MGASA-2022-0177 - Updated libxml2 packages fix security vulnerability
SRPMS
- 8/core/libxml2-2.9.10-7.4.mga8