Описание
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | released | 2.9.1+dfsg1-3ubuntu4.13+esm8 |
esm-infra/bionic | released | 2.9.4+dfsg1-6.1ubuntu1.9+esm4 |
esm-infra/focal | released | 2.9.10+dfsg-5ubuntu0.20.04.10+esm1 |
esm-infra/xenial | released | 2.9.3+dfsg1-1ubuntu0.7+esm9 |
jammy | released | 2.9.13+dfsg-1ubuntu0.8 |
noble | released | 2.9.14+dfsg-1.3ubuntu3.4 |
oracular | ignored | end of life, was needs-triage |
plucky | released | 2.12.7+dfsg+really2.9.14-0.4ubuntu0.2 |
upstream | released |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
A flaw was found in libxml2's xmlBuildQName function, where integer ov ...
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
EPSS
7.5 High
CVSS3