First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the application to crash due to a Heap use-after-free in xmlSAX2AttributeNs. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=759020">https://bugzilla.gnome.org/show_bug.cgi?id=759020</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb">https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9f60551906fb</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338691 is considered critical due to the potential for application crashes from a use-after-free vulnerability.
To fix REDHAT-BUG-1338691, update to the latest version of the libxml2 library that has addressed this vulnerability.
The affected software for REDHAT-BUG-1338691 is the GNOME libxml2 library.
REDHAT-BUG-1338691 is a heap use-after-free vulnerability identified in the xmlSAX2AttributeNs function.
The potential impacts of REDHAT-BUG-1338691 include application crashes, leading to service disruptions and denial of service.