{"id":"MGASA-2022-0177","summary":"Updated libxml2 packages fix security vulnerability","details":"In libxml2 before 2.9.14, several buffer handling functions in buf.c\n(xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This\ncan result in out-of-bounds memory writes. Exploitation requires a victim\nto open a crafted, multi-gigabyte XML file. Other software using libxml2's\nbuffer functions, for example libxslt through 1.1.35, is affected as well.\n(CVE-2022-29824)\n","modified":"2026-02-04T04:17:00.935998Z","published":"2022-05-12T10:24:45Z","related":["CVE-2022-29824"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2022-0177.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=30394"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.10-7.4.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2022-0177.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}