In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf) and tree.c (xmlBuffer) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
{
"license": "CC-BY-4.0",
"sources": [
{
"id": "CVE-2022-29824",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2022-29824",
"modified": "2024-11-21T06:59:45.417Z",
"published": "2022-05-03T03:15:06.687Z",
"imported": "2025-10-28T18:09:07.783Z"
}
]
}