
Cloud Vulnerability DB
A community-led vulnerabilities database
A flaw was discovered in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free vulnerability. The vulnerability was discovered in April 2021 and assigned identifier CVE-2021-3518 (NVD, Debian).
The vulnerability exists in the xmlXIncludeDoProcess() function in xinclude.c of libxml2. When processing specially crafted XML files, a use-after-free condition could be triggered. The issue was addressed with improved checks in version 2.9.11 (Red Hat Bugzilla).
A successful exploitation of this vulnerability could lead to arbitrary code execution, with potential impacts to confidentiality, integrity, and availability of the affected system (Debian).
The vulnerability has been fixed in libxml2 version 2.9.11. Users should upgrade to this version or apply appropriate security patches provided by their vendors. Multiple vendors have released patches including Red Hat, Debian, Apple, and others (Red Hat, Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."