A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1956522 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ | |
https://security.gentoo.org/glsa/202107-05 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210625-0002/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Not Applicable |
https://www.oracle.com/security-alerts/cpuoct2021.html | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-05-14T19:50:10
Updated: 2022-07-25T16:35:39
Reserved: 2021-05-05T00:00:00
Link: CVE-2021-3537
JSON object: View
NVD Information
Status : Modified
Published: 2021-05-14T20:15:16.553
Modified: 2023-11-07T03:38:05.560
Link: CVE-2021-3537
JSON object: View
Redhat Information
No data.
CWE