Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-56171

Опубликовано: 18 фев. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

РелизСтатусПримечание
devel

released

2.12.7+dfsg+really2.9.14-0.2ubuntu4
esm-infra-legacy/trusty

released

2.9.1+dfsg1-3ubuntu4.13+esm7
esm-infra/bionic

released

2.9.4+dfsg1-6.1ubuntu1.9+esm2
esm-infra/focal

not-affected

2.9.10+dfsg-5ubuntu0.20.04.9
esm-infra/xenial

released

2.9.3+dfsg1-1ubuntu0.7+esm7
focal

released

2.9.10+dfsg-5ubuntu0.20.04.9
jammy

released

2.9.13+dfsg-1ubuntu0.6
noble

released

2.9.14+dfsg-1.3ubuntu3.2
oracular

released

2.12.7+dfsg-3ubuntu0.2
plucky

released

2.12.7+dfsg+really2.9.14-0.2ubuntu4

Показывать по

EPSS

Процентиль: 0%
0.00007
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

CVSS3: 7.8
nvd
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

CVSS3: 7.8
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.8
debian
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free i ...

CVSS3: 7.8
github
4 месяца назад

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

EPSS

Процентиль: 0%
0.00007
Низкий

7.8 High

CVSS3

Уязвимость CVE-2024-56171