Описание
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
libxml2 | fixed | 2.9.3+dfsg1-1 | package |
Примечания
https://gitlab.gnome.org/GNOME/libxml2/-/commit/28cd9cb747a94483f4aea7f0968d202c20bb4cfc (v2.9.3)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da (v2.9.3)
https://bugzilla.gnome.org/show_bug.cgi?id=756479 (upstream bug not yet open)
EPSS
Связанные уязвимости
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
Уязвимость библиотеки libxml2, позволяющая нарушителю получить доступ к защищаемой информации из памяти процесса
EPSS