libxml2.so is vulnerable to denial of service. The xmlBufCreateSize
function of buf.c
does not properly check types of buffer sizes, allowing an attacker to crash the application by providing large multi-gigabyte buffers.
packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
github.com/advisories/GHSA-3rrw-pv9w-qgch
github.com/GNOME/libxml2/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
github.com/GNOME/libxml2/releases/tag/v2.9.14
gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
gitlab.gnome.org/GNOME/libxslt/-/tags
lists.debian.org/debian-lts-announce/2022/05/msg00023.html
lists.fedoraproject.org/archives/list/[email protected]/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
lists.fedoraproject.org/archives/list/[email protected]/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
lists.fedoraproject.org/archives/list/[email protected]/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
security.gentoo.org/glsa/202210-03
security.netapp.com/advisory/ntap-20220715-0006/
www.debian.org/security/2022/dsa-5142
www.oracle.com/security-alerts/cpujul2022.html