First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the application to crash due to a heap-based buffer underread in xmlParseName. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=759573">https://bugzilla.gnome.org/show_bug.cgi?id=759573</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83">https://git.gnome.org/browse/libxml2/commit/?id=00906759053986b8079985644172085f74331f83</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338686 is considered high due to the potential for a heap-based buffer underread.
To fix REDHAT-BUG-1338686, update the libxml2 library to the latest version as recommended in the vendor's advisories.
The vulnerability in REDHAT-BUG-1338686 is caused by improper handling of a maliciously crafted file which can lead to a crash.
The potential impacts of REDHAT-BUG-1338686 include application crashes and possible denial of service.
The software affected by REDHAT-BUG-1338686 includes the GNOME libxml2 library.