Lucene search

K
mageiaGentoo FoundationMGASA-2024-0172
HistoryMay 09, 2024 - 5:40 a.m.

Updated libxml2 packages fix a security vulnerability

2024-05-0905:40:29
Gentoo Foundation
advisories.mageia.org
34
libxml2
security vulnerability
xml reader
dtd validation
xinclude
use-after-free
cve-2024-25062
unix

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

17.0%

An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free. (CVE-2024-25062)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchlibxml2< 2.10.4-1.3libxml2-2.10.4-1.3.mga9

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

17.0%