{"id":"JLSEC-2025-75","summary":"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer...","details":"In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.","modified":"2025-11-06T23:03:07.650617Z","published":"2025-10-17T17:40:51.659Z","upstream":["CVE-2022-29824"],"database_specific":{"license":"CC-BY-4.0","sources":[{"id":"CVE-2022-29824","published":"2022-05-03T03:15:06.687Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-29824","modified":"2024-11-21T06:59:45.417Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29824","imported":"2025-10-28T18:09:07.783Z"}]},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html"},{"type":"WEB","url":"http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxslt/-/tags"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202210-03"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220715-0006/"},{"type":"WEB","url":"https://www.debian.org/security/2022/dsa-5142"},{"type":"WEB","url":"https://www.oracle.com/security-alerts/cpujul2022.html"}],"affected":[{"package":{"name":"XML2_jll","ecosystem":"Julia","purl":"pkg:julia/XML2_jll?uuid=02c8fc9c-b97f-50b9-bbe4-9be30ff0a78a"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.9.14+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-75.json"}},{"package":{"name":"XSLT_jll","ecosystem":"Julia","purl":"pkg:julia/XSLT_jll?uuid=aed1982a-8fda-507f-9586-7b0439959a61"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.1.41+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-75.json"}}],"schema_version":"1.7.3"}