First published: Sun Feb 20 2022(Updated: )
A flaw was found in libxml2. A call to the xmlGetID function can return a pointer already freed when parsing an XML document with the XML_PARSE_DTDVALID option and without the XML_PARSE_NOENT option, resulting in a use-after-free issue.
Credit: CVE-2022-23308 Arsenii Kostromin (0x3c3e) MicrosoftJonathan Bar Or MicrosoftZhipeng Huo @R3dF09 Tencent Security Xuanwu LabYuebin Sun @yuebinsun2020 Tencent Security Xuanwu LabMax Shavrick @_mxms the Google Security TeamZubair Ashraf CrowdstrikeCVE-2022-0778 Mickey Jin @patch1t @gorelics an anonymous researcher Linus Henze Pinauten GmbHPeter Nguyễn Vũ Hoàng STAR LabsFelix Poulin-Belanger Antonio Cheong Yu Xuan YCISCQArsenii Kostromin (0x3c3e) CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 Heige KnownSec 404 TeamBo Qu Palo Alto NetworksScarlet Raine Wang Yu CyberservalCVE-2022-0530 Tavis Ormandy CVE-2021-45444 Liu Long Ant Security LightJack Dates RET2 Systems IncAntonio Zekic @antoniozekic Jeonghoon Shin Theori working with Trend Micro Zero Day InitiativePeter Nguyễn Vũ Hoàng @peternguyen14 STAR LabsNed Williamson Google Project Zero @gorelics BreakPoint BreakPointRon Masas BreakPointWojciech Reguła @_r3ggi SecuRingYonghwi Jin @jinmo123 TheoriLockheed Martin Red Team Jeremy Brown Trend Micro Zero Day InitiativeMichael DePlante @izobashi Trend Micro Zero Day InitiativeQi Sun Trend MicroYe Zhang @co0py_Cat Baidu SecurityRobert Ai Trend MicroCVE-2021-44224 CVE-2021-44790 CVE-2022-22719 CVE-2022-22720 CVE-2022-22721 Paul Walker BuryNathaniel Ekoniak Ennate TechnologiesGergely Kalman @gergely_kalman Mandiant MandiantJoshua Mason MandiantRon Waisberg SecuRingan anonymous researcher SecuRing Perception PointRon Hass @ronhass7 Perception Pointryuzaki Chijin Zhou ShuiMuYuLin LtdTsinghua wingtecher lab Jeonghoon Shin TheoriSorryMybad @S0rryMybad Kunlun LabDongzhuo Zhao ADLab of VenustechABC Research s.r.o Jon Thompson EvolveIA) actae0n Blacksun Hackers Club working with Trend Micro Zero Day InitiativeAndrew Williams GoogleAvi Drissman Googlechenyuwang @mzzzz__ Tencent Security Xuanwu LabJordy Zomer @pwningsystems cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr-util | <0:1.6.1-91.el8 | 0:1.6.1-91.el8 |
redhat/jbcs-httpd24-curl | <0:7.78.0-3.el8 | 0:7.78.0-3.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-80.el8 | 0:2.4.37-80.el8 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-41.el8 | 0:1.39.2-41.el8 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-11.el8 | 1:1.1.1g-11.el8 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-11.el8 | 0:1.0.0-11.el8 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-26.el8 | 0:0.4.10-26.el8 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-91.jbcs.el7 | 0:1.6.1-91.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.78.0-3.jbcs.el7 | 0:7.78.0-3.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-80.jbcs.el7 | 0:2.4.37-80.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-41.jbcs.el7 | 0:1.39.2-41.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-11.jbcs.el7 | 1:1.1.1g-11.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-11.jbcs.el7 | 0:1.0.0-11.jbcs.el7 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-26.jbcs.el7 | 0:0.4.10-26.jbcs.el7 |
redhat/libxml2 | <0:2.9.7-12.el8_5 | 0:2.9.7-12.el8_5 |
redhat/libxml2 | <2.9.13 | 2.9.13 |
Apple macOS Monterey | <12.4 | 12.4 |
Apple macOS | <11.6.6 | 11.6.6 |
tvOS | <15.5 | 15.5 |
macOS Catalina | ||
Apple iOS, iPadOS, and watchOS | <15.5 | 15.5 |
Apple iOS, iPadOS, and watchOS | <15.5 | 15.5 |
Apple iOS, iPadOS, and watchOS | <8.6 | 8.6 |
libxml2 | <2.9.13 | |
Fedora | =34 | |
Debian | =9.0 | |
Apple iOS, iPadOS, and watchOS | <15.5 | |
iOS | <15.5 | |
Apple iOS and macOS | >=10.15.0<10.15.7 | |
Apple iOS and macOS | =10.15.7 | |
Apple iOS and macOS | =10.15.7-security_update_2020-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-001 | |
Apple iOS and macOS | =10.15.7-security_update_2021-002 | |
Apple iOS and macOS | =10.15.7-security_update_2021-003 | |
Apple iOS and macOS | =10.15.7-security_update_2021-004 | |
Apple iOS and macOS | =10.15.7-security_update_2021-005 | |
Apple iOS and macOS | =10.15.7-security_update_2021-006 | |
Apple iOS and macOS | =10.15.7-security_update_2021-007 | |
Apple iOS and macOS | =10.15.7-security_update_2021-008 | |
Apple iOS and macOS | =10.15.7-security_update_2022-001 | |
Apple iOS and macOS | =10.15.7-security_update_2022-003 | |
Apple iOS and macOS | >=11.6.0<11.6.6 | |
Apple iOS and macOS | >=12.0<12.4 | |
tvOS | <15.5 | |
Apple iOS, iPadOS, and watchOS | <8.6 | |
NetApp Active IQ Unified Manager for VMware vSphere | ||
NetApp Clustered Data ONTAP | ||
netapp clustered data ontap antivirus connector | ||
NetApp Manageability SDK | ||
NetApp ONTAP Select Deploy | ||
netapp smi-s provider | ||
NetApp SnapDrive for Unix | ||
netapp snapmanager Oracle | ||
netapp solidfire\, enterprise sds \& hci storage node | ||
netapp solidfire \& hci management node | ||
netapp bootstrap os | ||
netapp hci compute node | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
oracle communications Cloud native core binding support function | =22.2.0 | |
oracle communications cloud native core network function cloud native environment | =22.1.0 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.1.2 | |
Oracle Communications Cloud Native Core Network Repository Function | =22.2.0 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =22.1.1 | |
Oracle Communications Cloud Native Core Unified Data Repository | =22.2.0 | |
oracle mysql workbench | <=8.0.29 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-23308 is a vulnerability in libxml2 that allows for a use-after-free issue.
Apple tvOS versions up to 15.5 are affected by CVE-2022-23308.
Apple macOS Monterey versions up to 12.4 are affected by CVE-2022-23308.
CVE-2022-23308 has a severity value of 8.1, which is considered high.
To fix CVE-2022-23308, it is recommended to update to the latest version of libxml2 or apply the specific security patches provided by the affected vendors.