There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
CVE-2021-3516 - High Severity Vulnerability
Vulnerable Library - https://source.codeaurora.org/quic/la/platform/external/libxml2/LA.UM.6.6.c27-04000-89xx.0
Library home page: https://source.codeaurora.org/quic/la/platform/external/libxml2/
Found in HEAD commit: 36c617da7227c5471a24ab8d026c496382f77ef5
Found in base branch: main
Vulnerable Source Files (1)
dvna/node_modules/libxmljs/vendor/libxml/xmllint.c
Vulnerability Details
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
Publish Date: 2021-06-01
URL: CVE-2021-3516
CVSS 3 Score Details (7.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://bugzilla.redhat.com/show_bug.cgi?id=1954225
Fix Resolution: Upgrade to version libxml2 2.9.11 or greater