Description
Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1859-1 | New libxml2 packages fix several issues |
Debian DSA |
DSA-1861-1 | New libxml packages fix several issues |
Ubuntu USN |
USN-815-1 | libxml2 vulnerabilities |
References
History
Tue, 21 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Apple
Subscribe
Iphone Os
Subscribe
Mac Os X
Subscribe
Mac Os X Server
Subscribe
Safari
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Google
Subscribe
Chrome
Subscribe
Opensuse
Subscribe
Opensuse
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Sun
Subscribe
Openoffice.org
Subscribe
Suse
Subscribe
Linux Enterprise
Subscribe
Linux Enterprise Server
Subscribe
Vmware
Subscribe
Esx
Subscribe
Esxi
Subscribe
Vcenter Server
Subscribe
Vma
Subscribe
Xmlsoft
Subscribe
Libxml
Subscribe
Libxml2
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-01-21T15:30:42.200Z
Reserved: 2009-07-09T00:00:00.000Z
Link: CVE-2009-2416
Updated: 2024-08-07T05:52:14.792Z
Status : Deferred
Published: 2009-08-11T18:30:00.983
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-2416
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN