*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Eduardo Barretto 
(ebarretto):

NULL Pointer Dereference allows attackers to cause a denial of service
(or application crash). This only applies when lxml is used together
with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not
affected. It allows triggering crashes through forged input data, given
a vulnerable code sequence in the application. The vulnerability is
caused by the iterwalk function (also used by the canonicalize
function). Such code shouldn’t be in wide-spread use, given that parsing
+ iterwalk would usually be replaced with the more efficient iterparse
function. However, an XML converter that serialises to C14N would also
be vulnerable, for example, and there are legitimate use cases for this
code sequence. If untrusted input is received (also remotely) and
processed via iterwalk function, a crash can be triggered.

Reference: https://ubuntu.com/security/CVE-2022-2309

** Affects: libxml2 (Ubuntu)
     Importance: Undecided
         Status: Confirmed

-- 
CVE-2022-2309: NULL Pointer Dereference allows attackers to cause a denial of 
service (or application crash)
https://bugs.launchpad.net/bugs/1996494
You received this bug notification because you are a member of Ubuntu Bugs, 
which is subscribed to the bug report.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to