libxml2 - (bulletinapr2019)ID: oval:org.secpod.oval:def:2104583 | Date: (C)2019-12-31 (M)2024-04-17 |
Class: PATCH | Family: unix |
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
Product: |
library/python/libxml2-34 |
library/python/libxml2-27 |
library/libxml2 |