Several vulnerabilities were discovered in libxml2, a library providing support to read, modify and write XML and HTML files. CVE-2022-40303 Maddie Stone discovered that missing safety checks in several functions can result in integer overflows when parsing a XML document with the XML_PARSE_HUGE option enabled. CVE-2022-40304 Ned Williamson and Nathan Wachholz discovered a vulnerability when handling detection of entity reference cycles, which may result in corrupted dictionary entries. This flaw may lead to logic errors, including memory errors like double free flaws. For the stable distribution (bullseye), these problems have been fixed in version 2.9.10+dfsg-6.7+deb11u3. We recommend that you upgrade your libxml2 packages. For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2
Several vulnerabilities were discovered in libxml2, a library providing support to read, modify and write XML and HTML files.
Maddie Stone discovered that missing safety checks in several functions can result in integer overflows when parsing a XML document with the XML_PARSE_HUGE option enabled.
Ned Williamson and Nathan Wachholz discovered a vulnerability when handling detection of entity reference cycles, which may result in corrupted dictionary entries. This flaw may lead to logic errors, including memory errors like double free flaws.
For the stable distribution (bullseye), these problems have been fixed in version 2.9.10+dfsg-6.7+deb11u3.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2