There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2021/Jul/54 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Jul/55 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Jul/58 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2021/Jul/59 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1954242 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ - | |
References | () https://security.gentoo.org/glsa/202107-05 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210625-0002/ - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212601 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212602 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212604 - Third Party Advisory | |
References | () https://support.apple.com/kb/HT212605 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Not Applicable | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
07 Nov 2023, 03:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-18 12:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3518
Mitre link : CVE-2021-3518
CVE.ORG link : CVE-2021-3518
JSON object : View
Products Affected
debian
- debian_linux
netapp
- manageability_software_development_kit
- active_iq_unified_manager
- snapdrive
- clustered_data_ontap_antivirus_connector
- clustered_data_ontap
- hci_h410c_firmware
- hci_h410c
- ontap_select_deploy_administration_utility
oracle
- mysql_workbench
- enterprise_manager_base_platform
- enterprise_manager_ops_center
- peoplesoft_enterprise_peopletools
- real_user_experience_insight
- communications_cloud_native_core_network_function_cloud_native_environment
fedoraproject
- fedora
xmlsoft
- libxml2
redhat
- jboss_core_services
- enterprise_linux
CWE
CWE-416
Use After Free