Debian Security Advisory
DSA-5271-1 libxml2 -- security update
- Date Reported:
- 05 Nov 2022
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 1022224, Bug 1022225.
In Mitre's CVE dictionary: CVE-2022-40303, CVE-2022-40304.
- More information:
Several vulnerabilities were discovered in libxml2, a library providing support to read, modify and write XML and HTML files.
Maddie Stone discovered that missing safety checks in several functions can result in integer overflows when parsing a XML document with the XML_PARSE_HUGE option enabled.
Ned Williamson and Nathan Wachholz discovered a vulnerability when handling detection of entity reference cycles, which may result in corrupted dictionary entries. This flaw may lead to logic errors, including memory errors like double free flaws.
For the stable distribution (bullseye), these problems have been fixed in version 2.9.10+dfsg-6.7+deb11u3.
We recommend that you upgrade your libxml2 packages.
For the detailed security status of libxml2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libxml2