Lucene search

K
mageiaGentoo FoundationMGASA-2024-0172
HistoryMay 09, 2024 - 5:40 a.m.

Updated libxml2 packages fix a security vulnerability

2024-05-0905:40:29
Gentoo Foundation
advisories.mageia.org
22
libxml2
security vulnerability
xml reader
dtd validation
xinclude
use-after-free
cve-2024-25062
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free. (CVE-2024-25062)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchlibxml2< 2.10.4-1.3libxml2-2.10.4-1.3.mga9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.9 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%