CVE-2022-40303

NameCVE-2022-40303
DescriptionAn issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3172-1, DSA-5271-1
Debian Bugs1022224

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)buster2.9.4+dfsg1-7+deb10u4vulnerable
buster (security)2.9.4+dfsg1-7+deb10u5fixed
bullseye2.9.10+dfsg-6.7+deb11u2vulnerable
bullseye (security)2.9.10+dfsg-6.7+deb11u3fixed
bookworm, sid2.9.14+dfsg-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcebuster2.9.4+dfsg1-7+deb10u5DLA-3172-1
libxml2sourcebullseye2.9.10+dfsg-6.7+deb11u3DSA-5271-1
libxml2source(unstable)2.9.14+dfsg-1.11022224

Notes

https://gitlab.gnome.org/GNOME/libxml2/-/issues/381
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0 (v2.10.3)
https://bugs.chromium.org/p/project-zero/issues/detail?id=2336

Search for package or bug name: Reporting problems