Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-29824: v2.9.14 · Tags · GNOME / libxml2

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf) and tree.c (xmlBuffer) don’t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2’s buffer functions, for example libxslt through 1.1.35, is affected as well.

CVE
#mac#xpath

Security

  • [CVE-2022-29824] Integer overflow in xmlBuf and xmlBuffer
  • Fix potential double-free in xmlXPtrStringRangeFunction
  • Fix memory leak in xmlFindCharEncodingHandler
  • Normalize XPath strings in-place
  • Prevent integer-overflow in htmlSkipBlankChars() and xmlSkipBlankChars() (David Kilzer)
  • Fix leak of xmlElementContent (David Kilzer)

Bug fixes

  • Fix parsing of subtracted regex character classes
  • Fix recursion check in xinclude.c
  • Reset last error in xmlCleanupGlobals
  • Fix certain combinations of regex range quantifiers
  • Fix range quantifier on subregex

Improvements

  • Fix recovery from invalid HTML start tags

Build system, portability

  • Define LFS macros before including system headers
  • Initialize XPath floating-point globals
  • configure: check for icu DEFS (James Hilliard)
  • configure.ac: produce tar.xz only (GNOME policy) (David Seifert)
  • CMakeLists.txt: Fix LIBXML_VERSION_NUMBER
  • Fix build with older Python versions
  • Fix --without-valid build

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907