vulnerability

CentOS Linux: CVE-2018-14404: Moderate: libxml2 security update (Multiple Advisories)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 19, 2018
Added
Apr 1, 2020
Modified
May 25, 2023

Description

A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.

Solutions

centos-upgrade-libxml2centos-upgrade-libxml2-debuginfocentos-upgrade-libxml2-debugsourcecentos-upgrade-libxml2-develcentos-upgrade-libxml2-pythoncentos-upgrade-libxml2-staticcentos-upgrade-python3-libxml2centos-upgrade-python3-libxml2-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.