Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3172-1 | libxml2 security update |
Debian DSA |
DSA-5271-1 | libxml2 security update |
EUVD |
EUVD-2022-43600 | An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault. |
Ubuntu USN |
USN-5760-1 | libxml2 vulnerabilities |
Ubuntu USN |
USN-5760-2 | libxml2 vulnerabilities |
Ubuntu USN |
USN-7659-1 | Nokogiri vulnerabilities |
Tue, 29 Apr 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-29T04:24:02.694Z
Reserved: 2022-09-09T00:00:00.000Z
Link: CVE-2022-40303
Updated: 2024-08-03T12:14:40.053Z
Status : Modified
Published: 2022-11-23T00:15:11.007
Modified: 2025-04-29T05:15:43.693
Link: CVE-2022-40303
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN