There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1954232 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ - | |
References | () https://security.gentoo.org/glsa/202107-05 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210625-0002/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211022-0004/ - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Not Applicable | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
07 Nov 2023, 03:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-19 14:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3517
Mitre link : CVE-2021-3517
CVE.ORG link : CVE-2021-3517
JSON object : View
Products Affected
debian
- debian_linux
netapp
- e-series_santricity_web_services
- manageability_software_development_kit
- santricity_unified_manager
- active_iq_unified_manager
- snapdrive
- snapmanager
- clustered_data_ontap_antivirus_connector
- oncommand_workflow_automation
- clustered_data_ontap
- e-series_santricity_os_controller
- hci_management_node
- e-series_santricity_storage_manager
- hci_h410c_firmware
- oncommand_insight
- hci_h410c
- solidfire
- ontap_select_deploy_administration_utility
oracle
- openjdk
- mysql_workbench
- enterprise_manager_base_platform
- zfs_storage_appliance_kit
- peoplesoft_enterprise_peopletools
- real_user_experience_insight
- communications_cloud_native_core_network_function_cloud_native_environment
fedoraproject
- fedora
xmlsoft
- libxml2
redhat
- jboss_core_services
- enterprise_linux
CWE
CWE-787
Out-of-bounds Write