Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-26434

Опубликовано: 05 сент. 2025
Источник: debian

Описание

In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2not-affectedpackage

Примечания

  • https://source.android.com/docs/security/bulletin/android-16

  • https://gitlab.gnome.org/GNOME/libxml2/-/issues/797

  • Introduced by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2adcde39206bbb0aa4d097fe62162400df5cf360 (v2.14.0)

  • Fixed by: https://gitlab.gnome.org/GNOME/libxml2/commit/5e7874015ef5ed8b2705eb2f7b0960f56f7760ea (v2.14.0)

Связанные уязвимости

CVSS3: 5.5
ubuntu
4 месяца назад

In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 5.5
redhat
4 месяца назад

In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 5.5
nvd
4 месяца назад

In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 5.5
github
4 месяца назад

In libxml2, there is a possible out of bounds read due to a buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.