Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2022-5250

Опубликовано: 30 июн. 2022
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2022-5250: libxml2 security update (MODERATE)

[2.9.13-1.1]

  • Fix CVE-2022-29824 (#2082299)

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

libxml2

2.9.13-1.el9_0.1

libxml2-devel

2.9.13-1.el9_0.1

python3-libxml2

2.9.13-1.el9_0.1

Oracle Linux x86_64

libxml2

2.9.13-1.el9_0.1

libxml2-devel

2.9.13-1.el9_0.1

python3-libxml2

2.9.13-1.el9_0.1

Связанные CVE

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

CVSS3: 7.4
redhat
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

CVSS3: 6.5
nvd
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.

CVSS3: 6.5
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.5
debian
около 3 лет назад

In libxml2 before 2.9.14, several buffer handling functions in buf.c ( ...