Use After Free Affecting libxml2 package, versions <2.9.4-r1
Threat Intelligence
EPSS
10.58% (96th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE39-LIBXML2-339147
- published 23 Jul 2016
- disclosed 23 Jul 2016
Introduced: 23 Jul 2016
CVE-2016-5131 Open this link in a new tabHow to fix?
Upgrade Alpine:3.9
libxml2
to version 2.9.4-r1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxml2
package and not the libxml2
package as distributed by Alpine
.
See How to fix?
for Alpine:3.9
relevant fixed versions and status.
Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
References
- https://support.apple.com/HT207141
- https://support.apple.com/HT207142
- https://support.apple.com/HT207143
- https://support.apple.com/HT207170
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
- http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
- http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html
- https://crbug.com/623378
- https://codereview.chromium.org/2127493002
- https://source.android.com/security/bulletin/2017-05-01
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131
- http://www.debian.org/security/2016/dsa-3637
- https://security-tracker.debian.org/tracker/CVE-2016-5131
- https://security.gentoo.org/glsa/201610-09
- https://security.gentoo.org/glsa/201701-37
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1358641
- http://rhn.redhat.com/errata/RHSA-2016-1485.html
- http://www.securityfocus.com/bid/92053
- http://www.securitytracker.com/id/1036428
- http://www.securitytracker.com/id/1038623
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-5131
- http://www.ubuntu.com/usn/USN-3041-1
CVSS Scores
version 3.1