MGASA-2019-0159

Source
https://advisories.mageia.org/MGASA-2019-0159.html
Import Source
https://advisories.mageia.org/MGASA-2019-0159.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0159
Related
Published
2019-05-12T09:35:33Z
Modified
2019-05-12T08:59:56Z
Summary
Updated mxml packages fix security vulnerabilities
Details

Updated mxml packages fix security vulnerabilities:

An issue has been found in Mini-XML (aka mxml) 2.12. It is a stack-based buffer overflow in mxmlwritenode in mxml-file.c via vectors involving a double-precision floating point number and the '<order type="real">' substring, as demonstrated by testmxml (CVE-2018-20004).

An issue has been found in Mini-XML (aka mxml) 2.12. It is a use-after-free in mxmlWalkNext in mxml-search.c, as demonstrated by mxmldoc (CVE-2018-20005).

In Mini-XML (aka mxml) v2.12, there is a use-after-free in the mxmlAdd function of the mxml-node.c file. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted xml file, as demonstrated by mxmldoc (CVE-2018-20592).

In Mini-XML (aka mxml) v2.12, there is stack-based buffer overflow in the scan_file function in mxmldoc.c (CVE-2018-20593).

References
Credits

Affected packages

Mageia:6 / mxml

Package

Name
mxml
Purl
pkg:rpm/mageia/mxml?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0-1.mga6

Ecosystem specific

{
    "section": "core"
}