First published: Fri Nov 13 2015(Updated: )
A buffer overread in xmlNextChar was found, causing segmentation fault when compiled with ASAN. Upstream bug (contains reproducer): <a href="https://bugzilla.gnome.org/show_bug.cgi?id=756263">https://bugzilla.gnome.org/show_bug.cgi?id=756263</a> Upstream patch: <a href="https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe">https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1281936 is classified as a security vulnerability due to the potential for denial of service caused by buffer overreads.
To fix REDHAT-BUG-1281936, update to the latest version of libxml2 that includes the patch addressing this vulnerability.
The issue in REDHAT-BUG-1281936 is caused by a buffer overread in the xmlNextChar function, which can lead to segmentation faults.
REDHAT-BUG-1281936 specifically affects the GNOME libxml2 library.
Currently, there is no official workaround for REDHAT-BUG-1281936; updating to a patched version is recommended.