First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A maliciously crafted file could cause the application to crash due to a Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=760263">https://bugzilla.gnome.org/show_bug.cgi?id=760263</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852">https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338696 is classified as critical due to the potential for application crashes.
To fix REDHAT-BUG-1338696, you should update the libxml2 library to the latest patched version.
REDHAT-BUG-1338696 is associated with heap use-after-free vulnerabilities in the libxml2 library.
Applications using the libxml2 library are affected by REDHAT-BUG-1338696.
You can identify if your system is vulnerable to REDHAT-BUG-1338696 by checking the version of the libxml2 library installed on your system.