First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the application to crash due to a heap-based out-of-bounds memory read. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=758606">https://bugzilla.gnome.org/show_bug.cgi?id=758606</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76">https://git.gnome.org/browse/libxml2/commit/?id=0bcd05c5cd83dec3406c8f68b769b1d610c72f76</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1338682 is considered a high severity vulnerability due to potential application crashes from malicious file input.
To mitigate REDHAT-BUG-1338682, update the libxml2 library to the latest patched version.
REDHAT-BUG-1338682 is a heap-based out-of-bounds memory read vulnerability in the libxml2 library.
REDHAT-BUG-1338682 affects applications that utilize the libxml2 library.
A maliciously crafted XML file can be used to exploit REDHAT-BUG-1338682, causing the application to crash.