Описание
In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libxml2 | not-affected | package |
Примечания
https://source.android.com/docs/security/bulletin/android-16
https://gitlab.gnome.org/GNOME/libxml2/-/issues/797
Introduced by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2adcde39206bbb0aa4d097fe62162400df5cf360 (v2.14.0)
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/commit/5e7874015ef5ed8b2705eb2f7b0960f56f7760ea (v2.14.0)
Связанные уязвимости
In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.