There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
|
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1954232 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ - | |
References | () https://security.gentoo.org/glsa/202107-05 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210625-0002/ - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211022-0004/ - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Not Applicable | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
07 Nov 2023, 03:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-05-19 14:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3517
Mitre link : CVE-2021-3517
CVE.ORG link : CVE-2021-3517
JSON object : View
Products Affected
oracle
- zfs_storage_appliance_kit
- communications_cloud_native_core_network_function_cloud_native_environment
- openjdk
- mysql_workbench
- enterprise_manager_base_platform
- peoplesoft_enterprise_peopletools
- real_user_experience_insight
netapp
- hci_h410c_firmware
- clustered_data_ontap_antivirus_connector
- e-series_santricity_storage_manager
- solidfire
- manageability_software_development_kit
- snapdrive
- clustered_data_ontap
- active_iq_unified_manager
- e-series_santricity_os_controller
- hci_h410c
- ontap_select_deploy_administration_utility
- oncommand_insight
- e-series_santricity_web_services
- santricity_unified_manager
- snapmanager
- hci_management_node
- oncommand_workflow_automation
xmlsoft
- libxml2
debian
- debian_linux
redhat
- enterprise_linux
- jboss_core_services
fedoraproject
- fedora
CWE
CWE-787
Out-of-bounds Write