First published: Tue May 03 2016(Updated: )
It is possible to trigger a stack overflow using a carefully crafted invalid xml file, the stack overflow occurs before libxml2 determines the xml file is invalid. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=765207">https://bugzilla.gnome.org/show_bug.cgi?id=765207</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1332443 is high due to the potential for a stack overflow vulnerability.
To fix REDHAT-BUG-1332443, update to the latest version of libxml2 that addresses this vulnerability.
REDHAT-BUG-1332443 is caused by a stack overflow triggered by a malformed XML file processed by libxml2.
REDHAT-BUG-1332443 affects various versions of libxml2 that do not incorporate patches addressing this vulnerability.
A workaround for REDHAT-BUG-1332443 is to validate XML files before processing them with libxml2.