DSA-5142-1 libxml2 -- security update

Related Vulnerabilities: CVE-2022-29824  

Felix Wilhelm reported that several buffer handling functions in libxml2, a library providing support to read, modify and write XML and HTML files, don't check for integer overflows, resulting in out-of-bounds memory writes if specially crafted, multi-gigabyte XML files are processed. An attacker can take advantage of this flaw for denial of service or execution of arbitrary code. For the oldstable distribution (buster), this problem has been fixed in version 2.9.4+dfsg1-7+deb10u4. For the stable distribution (bullseye), this problem has been fixed in version 2.9.10+dfsg-6.7+deb11u2. We recommend that you upgrade your libxml2 packages. For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2

Debian Security Advisory

DSA-5142-1 libxml2 -- security update

Date Reported:
22 May 2022
Affected Packages:
libxml2
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1010526.
In Mitre's CVE dictionary: CVE-2022-29824.
More information:

Felix Wilhelm reported that several buffer handling functions in libxml2, a library providing support to read, modify and write XML and HTML files, don't check for integer overflows, resulting in out-of-bounds memory writes if specially crafted, multi-gigabyte XML files are processed. An attacker can take advantage of this flaw for denial of service or execution of arbitrary code.

For the oldstable distribution (buster), this problem has been fixed in version 2.9.4+dfsg1-7+deb10u4.

For the stable distribution (bullseye), this problem has been fixed in version 2.9.10+dfsg-6.7+deb11u2.

We recommend that you upgrade your libxml2 packages.

For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2