CVE-2020-24977

NameCVE-2020-24977
DescriptionGNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2369-1
NVD severitymedium
Debian Bugs969529

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)stretch2.9.4+dfsg1-2.2+deb9u2vulnerable
stretch (security)2.9.4+dfsg1-2.2+deb9u3fixed
buster2.9.4+dfsg1-7+deb10u1vulnerable
bullseye, sid2.9.10+dfsg-6.3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2sourcestretch2.9.4+dfsg1-2.2+deb9u3DLA-2369-1
libxml2source(unstable)2.9.10+dfsg-6.2unimportant969529

Notes

https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
The issue is specific and restricted to xmllint:
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178#note_892545
and present before the 0b19f236a263 ("Fixed ICU to set flush correctly and
provide pivot buffer.") commit itself.
Crash in CLI tool, no security impact

Search for package or bug name: Reporting problems