Описание
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | not-affected | see notes |
| esm-infra-legacy/trusty | not-affected | see notes |
| esm-infra/bionic | not-affected | see notes |
| esm-infra/focal | not-affected | see notes |
| esm-infra/xenial | not-affected | see notes |
| focal | not-affected | see notes |
| jammy | not-affected | see notes |
| lunar | not-affected | see notes |
| mantic | not-affected | see notes |
Показывать по
6.5 Medium
CVSS3
Связанные уязвимости
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds rea ...
6.5 Medium
CVSS3