vulnerability
CentOS Linux: CVE-2018-14404: Moderate: libxml2 security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jul 19, 2018 | Apr 1, 2020 | May 25, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jul 19, 2018
Added
Apr 1, 2020
Modified
May 25, 2023
Description
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
Solutions
centos-upgrade-libxml2centos-upgrade-libxml2-debuginfocentos-upgrade-libxml2-debugsourcecentos-upgrade-libxml2-develcentos-upgrade-libxml2-pythoncentos-upgrade-libxml2-staticcentos-upgrade-python3-libxml2centos-upgrade-python3-libxml2-debuginfo
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.