There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
CVE-2021-3516 - High Severity Vulnerability
Vulnerable Library - https://source.codeaurora.org/quic/la/platform/external/libxml2/10.00.00.561
Library home page: https://source.codeaurora.org/quic/la/platform/external/libxml2/
Found in HEAD commit: 43bb56f33bd8282d18aa6e095f173d774542f4c3
Found in base branch: master
Vulnerable Source Files (1)
/xmllint.c
Vulnerability Details
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Publish Date: 2021-06-01
URL: CVE-2021-3516
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2021-3516
Release Date: 2021-06-01
Fix Resolution: libxml2-debugsource - 2.9.7-9,2.9.7-9;libxml2-debuginfo - 2.9.7-9,2.9.7-9;libxml2 - 2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9;python3-libxml2-debuginfo - 2.9.7-9,2.9.7-9;python3-libxml2 - 2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9;libxml2-devel - 2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9,2.9.7-9
Step up your Open Source Security Game with Mend here