A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2020/11/16/1 | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27EQ2JCVMKG3EYTBYO4642P773I2NYUV/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUIND56AOKEHHBE4OYV57M73LLOLJRLV/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1900685 | patch third party advisory issue tracking |
https://bugs.librdf.org/mantis/view.php?id=650 | patch vendor advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2021/12/msg00009.html | third party advisory mailing list |