Описание
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
A NULL pointer dereference flaw was found in libxml2, where it did not propagate errors while parsing XML mixed content. This flaw causes the application to crash if an untrusted XML document is parsed in recovery mode and post validated. The highest threat from this vulnerability is to system availability.
Отчет
For the flaw to be exploitable, the document must be parsed in recovery mode and post validated (e.g.: when used in the xmlling
tool, both -recover
and -postvalid
options must be used for the flaw to be exploitable)
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | libxml2 | Out of support scope | ||
Red Hat Enterprise Linux 7 | libxml2 | Out of support scope | ||
Red Hat Enterprise Linux 9 | libxml2 | Not affected | ||
JBoss Core Services for RHEL 8 | jbcs-httpd24-apr-util | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-curl | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-httpd | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-mod_cluster-native | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-mod_http2 | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-mod_jk | Fixed | RHSA-2022:1389 | 20.04.2022 |
JBoss Core Services for RHEL 8 | jbcs-httpd24-mod_md | Fixed | RHSA-2022:1389 | 20.04.2022 |
Показывать по
Дополнительная информация
Статус:
7.5 High
CVSS3
Связанные уязвимости
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
A vulnerability found in libxml2 in versions before 2.9.11 shows that ...
Nokogiri Implements libxml2 version vulnerable to null pointer dereferencing
7.5 High
CVSS3