{"id":"CVE-2016-5131","details":"Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.","modified":"2026-05-18T05:48:09.007400453Z","published":"2016-07-23T19:59:13.767Z","related":["SUSE-SU-2018:0395-1","SUSE-SU-2018:0401-1","openSUSE-SU-2016:1868-1","openSUSE-SU-2016:1869-1","openSUSE-SU-2024:10171-1","openSUSE-SU-2024:11340-1","openSUSE-SU-2024:11912-1","openSUSE-SU-2024:12948-1","openSUSE-SU-2024:13165-1","openSUSE-SU-2024:14174-1","openSUSE-SU-2025:14697-1","openSUSE-SU-2026:10356-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"apple:iphone_os","extracted_events":[{"fixed":"10.0"}]},{"cpes":["cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"apple:mac_os_x","extracted_events":[{"fixed":"10.12"}]},{"cpes":["cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"apple:tvos","extracted_events":[{"fixed":"10.0"}]},{"cpes":["cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"apple:watchos","extracted_events":[{"fixed":"3.0"}]},{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"],"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux","extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"}]},{"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}]},{"cpes":["cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"google:chrome","extracted_events":[{"fixed":"52.0.2743.82"}]},{"cpes":["cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"42.1"}]},{"cpes":["cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"opensuse:opensuse","extracted_events":[{"last_affected":"13.1"},{"last_affected":"13.2"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_desktop","extracted_events":[{"last_affected":"6.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_server","extracted_events":[{"last_affected":"6.0"}]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux_workstation","extracted_events":[{"last_affected":"6.0"}]},{"cpes":["cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD","vendor_product":"suse:linux_enterprise","extracted_events":[{"last_affected":"12.0"}]}]},"references":[{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/92053"},{"type":"WEB","url":"http://www.securitytracker.com/id/1036428"},{"type":"WEB","url":"http://www.securitytracker.com/id/1038623"},{"type":"WEB","url":"https://codereview.chromium.org/2127493002"},{"type":"WEB","url":"https://crbug.com/623378"},{"type":"WEB","url":"https://source.android.com/security/bulletin/2017-05-01"},{"type":"WEB","url":"https://support.apple.com/HT207141"},{"type":"WEB","url":"https://support.apple.com/HT207142"},{"type":"WEB","url":"https://support.apple.com/HT207143"},{"type":"WEB","url":"https://support.apple.com/HT207170"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1485.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3637"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3041-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-09"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-37"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1358641"},{"type":"ARTICLE","url":"http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/libxml2","events":[{"introduced":"0"},{"last_affected":"bdec2183f34b37ee89ae1d330c6ad2bb4d76605f"}],"database_specific":{"cpe":"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.9.4"}]}}],"versions":["v2.9.4","CVE-2016-3627","CVE-2016-1833","CVE-2016-1835","CVE-2016-1837","CVE-2016-1836","CVE-2016-1839","CVE-2016-1838","CVE-2016-1840","CVE-2016-4449","CVE-2016-4483","CVE-2016-1834","CVE-2016-3705","v2.9.4-rc2","v2.9.4-rc1","CVE-2016-1762","v2.9.3","CVE-2015-8242","CVE-2015-7500","CVE-2015-7499-2","CVE-2015-7499-1","CVE-2015-5312","CVE-2015-7497","CVE-2015-7498","CVE-2015-8035","CVE-2015-7942-2","CVE-2015-7942","CVE-2015-8317","CVE-2015-1819","CVE-2015-7941_2","CVE-2015-7941_1","v2.9.2","CVE-2014-3660","v2.9.2-rc2","v2.9.2-rc1","CVE-2014-0191","v2.9.1","CVE-2013-2877","v2.9.0","v2.9.0-rc2","v2.8.0","v2.8.0-rc2","v2.8.0-rc1","v2.7.8","v2.7.7","v2.7.6","v2.7.5","v2.7.4","LIBXML2.7.3","LIBXML2.7.2","LIBXML2.7.1","LIBXML2.7.0","LIBXML2.6.32","LIBXML2_2_6_28","LIBXML2_2_6_27","LIBXML2_2_6_26","LIBXML2_2_6_24","LIBXML2_2_6_23","LIBXML2_2_6_22","LIBXML2_2_6_21","LIBXML2_2_6_20","LIBXML2_2_6_19","LIBXML2_2_6_18","LIBXML2_2_6_16","LIBXML2_2_6_15","LIBXML2_2_6_14","LIBXML2_2_6_13","LIBXML2_2_6_12","LIBXML2_2_6_11","LIBXML_2_6_10","LIBXML2_2_6_9","LIBXML2_2_6_8","LIBXML2_2_6_7","LIBXML2_2_6_6","LIBXML2_2_6_5","LIBXML2_2_6_4","LIBXML2_2_6_3","LIBXML2_2_6_2","LIBXML2_2_6_1","LIBXML2_6_0","LIBXML2_2_5_x","LIBXML2_2_5_10","LIBXML2_2_5_9","LIBXML2_2_5_8","LIBXML2_2_5_7","LIBXML_2_5_6","LIBXML_2_5_5","LIBXML_2_5_4","LIBXML_2_5_3","LIBXML_2_5_2","LIBXML_2_5_1","LIBXML2_2_5_0","LIBXML_2_4_30","LIBXML_2_4_29","LIBXML_2_4_27","LIBXML_2_4_26","LIBXML_2_4_25","LIBXML_2_4_24","LIBXML_2_4_23","LIBXML_2_4_22","LIBXML2_2_4_21","LIBXML_2_4_20","LIBXML_2_4_18","LIBXML_2_4_13","LIBXML_2_4_16","LIBXML_2_4_14","LIBXML_2_4_12","LIBXML_2_4_11","LIBXML_2_4_7","LIBXML_2_4_6","LIBXML_2_4_4","LIBXML_2_4_3","LIBXML_2_4_2","LIBXML_2_4_0","LIBXML_2_3_14","LIBXML_2_3_13","LIBXML_2_3_12","LIBXML_2_3_11","LIBXML_2_3_10","LIBXML_2_3_9","LIBXML_2_3_8","help","LIBXML_2_3_7","LIBXML_2_3_6","LIBXML_2_3_5","LIBXML_2_3_4","LIBXML_2_3_3","LIBXML_2_3_2","PRE_MUCKUP3","PRE_MUCKUP2","PRE_MUCKUP","LIBXML_2_3_0","LIBXML_2_2_8","LIBXML_2_2_7","LIBXML_2_2_6","LIBXML_2_2_4","GNOME_PRINT_0_24","LIBXML_2_2_3","LIBXML_2_2_1","LIBXML_2_1_1","LIBXML_2_1_0","LIB_XML_1_X","EAZEL-NAUTILUS-MS-AUG07","LIBXML_2_0_0","LIBXML_TEST_2_0_0","LIBXML_1_8_6","LIBXML_1_8_5","LIB_XML_1_8_3","LIB_XML_1_7_3","LIB_XML_1_7_1","LIB_XML_1_7_0","LIB_XML_1_6_2","LIB_XML_1_6_1","LIBXML_1_5_0","LIB_XML_1_4","LIB_XML_1_3","LIB_XML_1_1","FOR_GNOME_0_99_1","LIBXML_0_99","GNUMERIC_FIRST_PUBLIC_RELEASE","GNOME_0_30"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5131.json"}},{"ranges":[{"type":"GIT","repo":"https://gitlab.gnome.org/gnome/libxml2","events":[{"introduced":"0"},{"last_affected":"bdec2183f34b37ee89ae1d330c6ad2bb4d76605f"}],"database_specific":{"cpe":"cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"2.9.4"}]}}],"versions":["v2.9.4","CVE-2016-3627","CVE-2016-1833","CVE-2016-1835","CVE-2016-1837","CVE-2016-1836","CVE-2016-1839","CVE-2016-1838","CVE-2016-1840","CVE-2016-4449","CVE-2016-4483","CVE-2016-1834","CVE-2016-3705","v2.9.4-rc2","v2.9.4-rc1","CVE-2016-1762","v2.9.3","CVE-2015-8242","CVE-2015-7500","CVE-2015-7499-2","CVE-2015-7499-1","CVE-2015-5312","CVE-2015-7497","CVE-2015-7498","CVE-2015-8035","CVE-2015-7942-2","CVE-2015-7942","CVE-2015-8317","CVE-2015-1819","CVE-2015-7941_2","CVE-2015-7941_1","v2.9.2","CVE-2014-3660","v2.9.2-rc2","v2.9.2-rc1","CVE-2014-0191","v2.9.1","CVE-2013-2877","v2.9.0","v2.9.0-rc2","v2.8.0","v2.8.0-rc2","v2.8.0-rc1","v2.7.8","v2.7.7","v2.7.6","v2.7.5","v2.7.4","LIBXML2.7.3","LIBXML2.7.2","LIBXML2.7.1","LIBXML2.7.0","LIBXML2.6.32","LIBXML2_2_6_28","LIBXML2_2_6_27","LIBXML2_2_6_26","LIBXML2_2_6_24","LIBXML2_2_6_23","LIBXML2_2_6_22","LIBXML2_2_6_21","LIBXML2_2_6_20","LIBXML2_2_6_19","LIBXML2_2_6_18","LIBXML2_2_6_16","LIBXML2_2_6_15","LIBXML2_2_6_14","LIBXML2_2_6_13","LIBXML2_2_6_12","LIBXML2_2_6_11","LIBXML_2_6_10","LIBXML2_2_6_9","LIBXML2_2_6_8","LIBXML2_2_6_7","LIBXML2_2_6_6","LIBXML2_2_6_5","LIBXML2_2_6_4","LIBXML2_2_6_3","LIBXML2_2_6_2","LIBXML2_2_6_1","LIBXML2_6_0","LIBXML2_2_5_x","LIBXML2_2_5_10","LIBXML2_2_5_9","LIBXML2_2_5_8","LIBXML2_2_5_7","LIBXML_2_5_6","LIBXML_2_5_5","LIBXML_2_5_4","LIBXML_2_5_3","LIBXML_2_5_2","LIBXML_2_5_1","LIBXML2_2_5_0","LIBXML_2_4_30","LIBXML_2_4_29","LIBXML_2_4_27","LIBXML_2_4_26","LIBXML_2_4_25","LIBXML_2_4_24","LIBXML_2_4_23","LIBXML_2_4_22","LIBXML2_2_4_21","LIBXML_2_4_20","LIBXML_2_4_18","LIBXML_2_4_13","LIBXML_2_4_16","LIBXML_2_4_14","LIBXML_2_4_12","LIBXML_2_4_11","LIBXML_2_4_7","LIBXML_2_4_6","LIBXML_2_4_4","LIBXML_2_4_3","LIBXML_2_4_2","LIBXML_2_4_0","LIBXML_2_3_14","LIBXML_2_3_13","LIBXML_2_3_12","LIBXML_2_3_11","LIBXML_2_3_10","LIBXML_2_3_9","LIBXML_2_3_8","help","LIBXML_2_3_7","LIBXML_2_3_6","LIBXML_2_3_5","LIBXML_2_3_4","LIBXML_2_3_3","LIBXML_2_3_2","PRE_MUCKUP3","PRE_MUCKUP2","PRE_MUCKUP","LIBXML_2_3_0","LIBXML_2_2_8","LIBXML_2_2_7","LIBXML_2_2_6","LIBXML_2_2_4","GNOME_PRINT_0_24","LIBXML_2_2_3","LIBXML_2_2_1","LIBXML_2_1_1","LIBXML_2_1_0","LIB_XML_1_X","EAZEL-NAUTILUS-MS-AUG07","LIBXML_2_0_0","LIBXML_TEST_2_0_0","LIBXML_1_8_6","LIBXML_1_8_5","LIB_XML_1_8_3","LIB_XML_1_7_3","LIB_XML_1_7_1","LIB_XML_1_7_0","LIB_XML_1_6_2","LIB_XML_1_6_1","LIBXML_1_5_0","LIB_XML_1_4","LIB_XML_1_3","LIB_XML_1_1","FOR_GNOME_0_99_1","LIBXML_0_99","GNUMERIC_FIRST_PUBLIC_RELEASE","GNOME_0_30"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-5131.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}