MGASA-2022-0177 - Updated libxml2 packages fix security vulnerability Publication date: 12 May 2022 URL: https://advisories.mageia.org/MGASA-2022-0177.html Type: security Affected Mageia releases: 8 CVE: CVE-2022-29824 In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well. (CVE-2022-29824) References: - https://bugs.mageia.org/show_bug.cgi?id=30394 - https://lists.fedoraproject.org/archives/list/[email protected]/thread/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 SRPMS: - 8/core/libxml2-2.9.10-7.4.mga8