vulnerability
Amazon Linux AMI 2: CVE-2021-3517: Security patch for java-1.8.0-amazon-corretto, java-11-amazon-corretto, libxml2 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | May 19, 2021 | Jun 24, 2021 | May 31, 2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 19, 2021
Added
Jun 24, 2021
Modified
May 31, 2024
Description
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
Solution(s)
amazon-linux-ami-2-upgrade-java-1-8-0-amazon-correttoamazon-linux-ami-2-upgrade-java-1-8-0-amazon-corretto-develamazon-linux-ami-2-upgrade-java-11-amazon-correttoamazon-linux-ami-2-upgrade-java-11-amazon-corretto-headlessamazon-linux-ami-2-upgrade-java-11-amazon-corretto-javadocamazon-linux-ami-2-upgrade-libxml2amazon-linux-ami-2-upgrade-libxml2-debuginfoamazon-linux-ami-2-upgrade-libxml2-develamazon-linux-ami-2-upgrade-libxml2-pythonamazon-linux-ami-2-upgrade-libxml2-static

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.