Описание
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
libxml2 | fixed | 2.9.3+dfsg1-1 | package |
Примечания
https://gitlab.gnome.org/GNOME/libxml2/-/commit/69030714cde66d525a8884bda01b9e8f0abf8e1e (v2.9.3)
https://bugzilla.gnome.org/show_bug.cgi?id=756733 (upstream bug not yet open)
EPSS
Связанные уязвимости
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
EPSS