Описание
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | needs-triage | |
esm-infra/xenial | needs-triage | |
jammy | needs-triage | |
noble | needs-triage | |
oracular | needs-triage | |
plucky | needs-triage | |
upstream | needs-triage |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
A flaw was found in libxml2's xmlBuildQName function, where integer ov ...
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
7.5 High
CVSS3