Integer Overflow or Wraparound Affecting python3-libxml2-python package, versions <2.9.7-150000.3.57.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-PYTHON3LIBXML2PYTHON-5488090
- published 27 Apr 2023
- disclosed 26 Apr 2023
Introduced: 26 Apr 2023
CVE-2022-29824 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 python3-libxml2-python to version 2.9.7-150000.3.57.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3-libxml2-python package and not the python3-libxml2-python package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
References
- https://www.suse.com/security/cve/CVE-2022-29824.html
- https://bugzilla.suse.com/1199132
- https://bugzilla.suse.com/1202878
- https://bugzilla.suse.com/1204121
- https://bugzilla.suse.com/1204131
- https://bugzilla.suse.com/1205069
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
- https://gitlab.gnome.org/GNOME/libxslt/-/tags
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
- https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://www.debian.org/security/2022/dsa-5142
- http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
- https://security.netapp.com/advisory/ntap-20220715-0006/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://security.gentoo.org/glsa/202210-03
- http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/