摘要:
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
安全等级: Low
公告ID: KylinSec-SA-2022-2071
发布日期: 2022年9月23日
关联CVE: CVE-2019-15903
In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2019-15903 | KY3.4-4A | python3 | Unaffected |
CVE-2019-15903 | KY3.4-5A | python3 | Unaffected |
CVE-2019-15903 | KY3.5.1 | python3 | Unaffected |