Release Date: | 2021-05-18 |
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
See more information about CVE-2021-3200 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 3.3 | Base Metrics: | AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L |
Access Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | None | User Interaction: | Required |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | Low |
Platform | Errata | Release Date |
Oracle Linux version 8 (libsolv) | ELSA-2021-4408 | 2021-11-16 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team