{"api_version":"1","generated_at":"2026-04-22T22:49:40+00:00","cve":"CVE-2022-2309","urls":{"html":"https://cve.report/CVE-2022-2309","api":"https://cve.report/api/cve/CVE-2022-2309.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-2309","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-2309"},"summary":{"title":"CVE-2022-2309","description":"NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.","state":"PUBLIC","assigner":"security@huntr.dev","published_at":"2022-07-05 10:15:00","updated_at":"2023-11-07 03:46:00"},"problem_types":["CWE-476"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO/","name":"FEDORA-2022-ed0eeb6a20","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: python-lxml-4.7.1-3.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202208-06","name":"GLSA-202208-06","refsource":"GENTOO","tags":[],"title":"lxml: Multiple Vulnerabilities (GLSA 202208-06) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO/","name":"FEDORA-2022-ed0eeb6a20","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: python-lxml-4.7.1-3.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f","name":"https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f","refsource":"MISC","tags":[],"title":"Fix a crash when incorrect parser input occurs together with usages o… · lxml/lxml@86368e9 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ/","name":"FEDORA-2022-ed17f59c1d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: python-lxml-4.9.1-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20220915-0006/","name":"https://security.netapp.com/advisory/ntap-20220915-0006/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-2309 lxml Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ/","name":"FEDORA-2022-ed17f59c1d","refsource":"","tags":[],"title":"[SECURITY] Fedora 37 Update: python-lxml-4.9.1-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba","name":"https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba","refsource":"CONFIRM","tags":[],"title":"huntr – Security Bounties for any GitHub repository","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-2309","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2309","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"2309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"lxml","cpe5":"lxml","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"2309","vulnerable":"-1","versionEndIncluding":"2.9.14","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"xmlsoft","cpe5":"libxml2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-2309","qid":"160286","title":"Oracle Enterprise Linux Security Update for python-lxml (ELSA-2022-8226)"},{"cve":"CVE-2022-2309","qid":"183150","title":"Debian Security Update for lxml (CVE-2022-2309)"},{"cve":"CVE-2022-2309","qid":"199063","title":"Ubuntu Security Notification for libxml2 Vulnerabilities (USN-5760-1)"},{"cve":"CVE-2022-2309","qid":"199399","title":"Ubuntu Security Notification for libxml2 Vulnerabilities (USN-6028-2)"},{"cve":"CVE-2022-2309","qid":"240874","title":"Red Hat Update for python-lxml (RHSA-2022:8226)"},{"cve":"CVE-2022-2309","qid":"283127","title":"Fedora Security Update for python (FEDORA-2022-ed0eeb6a20)"},{"cve":"CVE-2022-2309","qid":"354712","title":"Amazon Linux Security Advisory for python-lxml : ALAS2022-2023-264"},{"cve":"CVE-2022-2309","qid":"355116","title":"Amazon Linux Security Advisory for python-lxml : ALAS2023-2023-034"},{"cve":"CVE-2022-2309","qid":"378883","title":"Splunk Enterprise August Third Party Package Updates (SVD-2023-0808)"},{"cve":"CVE-2022-2309","qid":"502526","title":"Alpine Linux Security Update for libxml2"},{"cve":"CVE-2022-2309","qid":"502740","title":"Alpine Linux Security Update for libxml2"},{"cve":"CVE-2022-2309","qid":"502786","title":"Alpine Linux Security Update for py3-lxml"},{"cve":"CVE-2022-2309","qid":"672101","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2303)"},{"cve":"CVE-2022-2309","qid":"672122","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2332)"},{"cve":"CVE-2022-2309","qid":"672140","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2447)"},{"cve":"CVE-2022-2309","qid":"672202","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2478)"},{"cve":"CVE-2022-2309","qid":"672255","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2663)"},{"cve":"CVE-2022-2309","qid":"672306","title":"EulerOS Security Update for python-lxml (EulerOS-SA-2022-2695)"},{"cve":"CVE-2022-2309","qid":"710581","title":"Gentoo Linux lxml Multiple Vulnerabilities (GLSA 202208-06)"},{"cve":"CVE-2022-2309","qid":"752517","title":"SUSE Enterprise Linux Security Update for python-lxml (SUSE-SU-2022:2908-1)"},{"cve":"CVE-2022-2309","qid":"753470","title":"SUSE Enterprise Linux Security Update for python-lxml (SUSE-SU-2022:2878-1)"},{"cve":"CVE-2022-2309","qid":"902440","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python-lxml (10049)"},{"cve":"CVE-2022-2309","qid":"902441","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (10048)"},{"cve":"CVE-2022-2309","qid":"902444","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (10058)"},{"cve":"CVE-2022-2309","qid":"902447","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python-lxml (10059)"},{"cve":"CVE-2022-2309","qid":"903932","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python-lxml (10059-1)"},{"cve":"CVE-2022-2309","qid":"903965","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (10058-1)"},{"cve":"CVE-2022-2309","qid":"903982","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for python-lxml (10049-1)"},{"cve":"CVE-2022-2309","qid":"903993","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for libxml2 (10048-1)"},{"cve":"CVE-2022-2309","qid":"940799","title":"AlmaLinux Security Update for python-lxml (ALSA-2022:8226)"},{"cve":"CVE-2022-2309","qid":"960561","title":"Rocky Linux Security Update for python-lxml (RLSA-2022:8226)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@huntr.dev","ID":"CVE-2022-2309","STATE":"PUBLIC","TITLE":"NULL Pointer Dereference in lxml/lxml"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"lxml/lxml","version":{"version_data":[{"version_affected":"<","version_value":"4.9.1"}]}}]},"vendor_name":"lxml"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-476 NULL Pointer Dereference"}]}]},"references":{"reference_data":[{"name":"https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba","refsource":"CONFIRM","url":"https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba"},{"name":"https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f","refsource":"MISC","url":"https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f"},{"refsource":"GENTOO","name":"GLSA-202208-06","url":"https://security.gentoo.org/glsa/202208-06"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20220915-0006/","url":"https://security.netapp.com/advisory/ntap-20220915-0006/"},{"refsource":"FEDORA","name":"FEDORA-2022-ed0eeb6a20","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/URHHSIBTPTALXMECRLAC2EVDNAFSR5NO/"},{"refsource":"FEDORA","name":"FEDORA-2022-ed17f59c1d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HGYC6L7ENH5VEGN3YWFBYMGKX6WNS7HZ/"}]},"source":{"advisory":"8264e74f-edda-4c40-9956-49de635105ba","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2022-07-05 10:15:00","lastModifiedDate":"2023-11-07 03:46:00","problem_types":["CWE-476"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:lxml:lxml:*:*:*:*:*:*:*:*","versionEndExcluding":"4.9.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.10","versionEndIncluding":"2.9.14","cpe_name":[]}]}],"cpe_match":[]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}