A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=…/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the programs crash using libxml or other possible undefined behaviors.
The product dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 10 | RedHat | libxml2-0:2.12.5-7.el10_0 | * |
Red Hat Enterprise Linux 8 | RedHat | libxml2-0:2.9.7-21.el8_10.1 | * |
Red Hat Enterprise Linux 8 | RedHat | libxml2-0:2.9.7-21.el8_10.1 | * |
Red Hat Enterprise Linux 9 | RedHat | libxml2-0:2.9.13-10.el9_6 | * |
Red Hat Enterprise Linux 9 | RedHat | libxml2-0:2.9.13-10.el9_6 | * |
Libxml2 | Ubuntu | oracular | * |