vulnerability
Amazon Linux 2023: CVE-2022-40304: Medium priority package update for libxml2 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Oct 14, 2022 | Feb 17, 2025 | Jul 9, 2025 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Oct 14, 2022
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
A flaw was found in libxml2. When a reference cycle is detected in the XML entity cleanup function the XML entity data can be stored in a dictionary. In this case, the dictionary becomes corrupted resulting in logic errors, including memory errors like double free.
A flaw was found in libxml2. When a reference cycle is detected in the XML entity cleanup function the XML entity data can be stored in a dictionary. In this case, the dictionary becomes corrupted resulting in logic errors, including memory errors like double free.
Solution(s)
amazon-linux-2023-upgrade-libxml2amazon-linux-2023-upgrade-libxml2-debuginfoamazon-linux-2023-upgrade-libxml2-debugsourceamazon-linux-2023-upgrade-libxml2-develamazon-linux-2023-upgrade-libxml2-staticamazon-linux-2023-upgrade-python3-libxml2amazon-linux-2023-upgrade-python3-libxml2-debuginfoamazon-linux-2023-upgrade-xmlsec1amazon-linux-2023-upgrade-xmlsec1-debuginfoamazon-linux-2023-upgrade-xmlsec1-debugsourceamazon-linux-2023-upgrade-xmlsec1-develamazon-linux-2023-upgrade-xmlsec1-opensslamazon-linux-2023-upgrade-xmlsec1-openssl-debuginfoamazon-linux-2023-upgrade-xmlsec1-openssl-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.