vulnerability

SUSE: CVE-2021-26222: SUSE Linux Security Advisory

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:P)
Published
Feb 8, 2021
Added
Nov 26, 2021
Modified
Oct 26, 2022

Description

The ezxml_new function in ezXML 0.8.6 and earlier is vulnerable to OOB write when opening XML file after exhausting the memory pool.

Solution(s)

suse-upgrade-libnetcdf-gnu-hpcsuse-upgrade-libnetcdf-gnu-mpich-hpcsuse-upgrade-libnetcdf-gnu-mvapich2-hpcsuse-upgrade-libnetcdf-gnu-openmpi1-hpcsuse-upgrade-libnetcdf-gnu-openmpi2-hpcsuse-upgrade-libnetcdf-gnu-openmpi3-hpcsuse-upgrade-libnetcdf-gnu-openmpi4-hpcsuse-upgrade-libnetcdf13suse-upgrade-libnetcdf13-32bitsuse-upgrade-libnetcdf13-openmpisuse-upgrade-libnetcdf13-openmpi-32bitsuse-upgrade-libnetcdf18suse-upgrade-libnetcdf18-32bitsuse-upgrade-libnetcdf18-openmpi2suse-upgrade-libnetcdf18-openmpi2-32bitsuse-upgrade-libnetcdf18-openmpi3suse-upgrade-libnetcdf18-openmpi3-32bitsuse-upgrade-libnetcdf18-openmpi4suse-upgrade-libnetcdf18-openmpi4-32bitsuse-upgrade-libnetcdf_4_6_1-gnu-hpcsuse-upgrade-libnetcdf_4_6_1-gnu-mpich-hpcsuse-upgrade-libnetcdf_4_6_1-gnu-mvapich2-hpcsuse-upgrade-libnetcdf_4_6_1-gnu-openmpi1-hpcsuse-upgrade-libnetcdf_4_6_1-gnu-openmpi2-hpcsuse-upgrade-libnetcdf_4_7_3-gnu-hpcsuse-upgrade-libnetcdf_4_7_3-gnu-mpich-hpcsuse-upgrade-libnetcdf_4_7_3-gnu-mvapich2-hpcsuse-upgrade-libnetcdf_4_7_3-gnu-openmpi2-hpcsuse-upgrade-libnetcdf_4_7_3-gnu-openmpi3-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-mpich-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-mvapich2-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-openmpi2-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-openmpi3-hpcsuse-upgrade-libnetcdf_4_7_4-gnu-openmpi4-hpcsuse-upgrade-netcdfsuse-upgrade-netcdf-develsuse-upgrade-netcdf-devel-datasuse-upgrade-netcdf-devel-staticsuse-upgrade-netcdf-gnu-hpcsuse-upgrade-netcdf-gnu-hpc-develsuse-upgrade-netcdf-gnu-mpich-hpcsuse-upgrade-netcdf-gnu-mpich-hpc-develsuse-upgrade-netcdf-gnu-mvapich2-hpcsuse-upgrade-netcdf-gnu-mvapich2-hpc-develsuse-upgrade-netcdf-gnu-openmpi1-hpcsuse-upgrade-netcdf-gnu-openmpi1-hpc-develsuse-upgrade-netcdf-gnu-openmpi2-hpcsuse-upgrade-netcdf-gnu-openmpi2-hpc-develsuse-upgrade-netcdf-gnu-openmpi3-hpcsuse-upgrade-netcdf-gnu-openmpi3-hpc-develsuse-upgrade-netcdf-gnu-openmpi4-hpcsuse-upgrade-netcdf-gnu-openmpi4-hpc-develsuse-upgrade-netcdf-openmpisuse-upgrade-netcdf-openmpi-develsuse-upgrade-netcdf-openmpi-devel-datasuse-upgrade-netcdf-openmpi-devel-staticsuse-upgrade-netcdf-openmpi2suse-upgrade-netcdf-openmpi2-develsuse-upgrade-netcdf-openmpi2-devel-staticsuse-upgrade-netcdf-openmpi3suse-upgrade-netcdf-openmpi3-develsuse-upgrade-netcdf-openmpi3-devel-staticsuse-upgrade-netcdf-openmpi4suse-upgrade-netcdf-openmpi4-develsuse-upgrade-netcdf-openmpi4-devel-staticsuse-upgrade-netcdf_4_6_1-gnu-hpcsuse-upgrade-netcdf_4_6_1-gnu-hpc-develsuse-upgrade-netcdf_4_6_1-gnu-hpc-devel-datasuse-upgrade-netcdf_4_6_1-gnu-hpc-devel-staticsuse-upgrade-netcdf_4_6_1-gnu-mpich-hpcsuse-upgrade-netcdf_4_6_1-gnu-mpich-hpc-develsuse-upgrade-netcdf_4_6_1-gnu-mpich-hpc-devel-staticsuse-upgrade-netcdf_4_6_1-gnu-mvapich2-hpcsuse-upgrade-netcdf_4_6_1-gnu-mvapich2-hpc-develsuse-upgrade-netcdf_4_6_1-gnu-mvapich2-hpc-devel-staticsuse-upgrade-netcdf_4_6_1-gnu-openmpi1-hpcsuse-upgrade-netcdf_4_6_1-gnu-openmpi1-hpc-develsuse-upgrade-netcdf_4_6_1-gnu-openmpi1-hpc-devel-staticsuse-upgrade-netcdf_4_6_1-gnu-openmpi2-hpcsuse-upgrade-netcdf_4_6_1-gnu-openmpi2-hpc-develsuse-upgrade-netcdf_4_6_1-gnu-openmpi2-hpc-devel-staticsuse-upgrade-netcdf_4_7_3-gnu-hpcsuse-upgrade-netcdf_4_7_3-gnu-hpc-develsuse-upgrade-netcdf_4_7_3-gnu-hpc-devel-staticsuse-upgrade-netcdf_4_7_3-gnu-mpich-hpcsuse-upgrade-netcdf_4_7_3-gnu-mpich-hpc-develsuse-upgrade-netcdf_4_7_3-gnu-mpich-hpc-devel-staticsuse-upgrade-netcdf_4_7_3-gnu-mvapich2-hpcsuse-upgrade-netcdf_4_7_3-gnu-mvapich2-hpc-develsuse-upgrade-netcdf_4_7_3-gnu-mvapich2-hpc-devel-staticsuse-upgrade-netcdf_4_7_3-gnu-openmpi2-hpcsuse-upgrade-netcdf_4_7_3-gnu-openmpi2-hpc-develsuse-upgrade-netcdf_4_7_3-gnu-openmpi2-hpc-devel-staticsuse-upgrade-netcdf_4_7_3-gnu-openmpi3-hpcsuse-upgrade-netcdf_4_7_3-gnu-openmpi3-hpc-develsuse-upgrade-netcdf_4_7_3-gnu-openmpi3-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-hpcsuse-upgrade-netcdf_4_7_4-gnu-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-mpich-hpcsuse-upgrade-netcdf_4_7_4-gnu-mpich-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-mpich-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-mvapich2-hpcsuse-upgrade-netcdf_4_7_4-gnu-mvapich2-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-mvapich2-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-openmpi2-hpcsuse-upgrade-netcdf_4_7_4-gnu-openmpi2-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-openmpi2-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-openmpi3-hpcsuse-upgrade-netcdf_4_7_4-gnu-openmpi3-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-openmpi3-hpc-devel-staticsuse-upgrade-netcdf_4_7_4-gnu-openmpi4-hpcsuse-upgrade-netcdf_4_7_4-gnu-openmpi4-hpc-develsuse-upgrade-netcdf_4_7_4-gnu-openmpi4-hpc-devel-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.