In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxslt/-/tags https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 2082277] Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 2082279] Created perl-Alien-Libxml2 tracking bugs for this issue: Affects: fedora-all [bug 2082280] Created qt5-qtwebengine tracking bugs for this issue: Affects: epel-all [bug 2082278] Affects: fedora-all [bug 2082281]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:5250 https://access.redhat.com/errata/RHSA-2022:5250
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:5317 https://access.redhat.com/errata/RHSA-2022:5317
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-29824
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:8841 https://access.redhat.com/errata/RHSA-2022:8841