First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. There exist a possible format string vulnerability. <a href="https://bugzilla.gnome.org/show_bug.cgi?id=761029">https://bugzilla.gnome.org/show_bug.cgi?id=761029</a> Upstream fixes: <a href="https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9">https://git.gnome.org/browse/libxml2/commit/?id=4472c3a5a5b516aaf59b89be602fbce52756c3e9</a> <a href="https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b">https://git.gnome.org/browse/libxml2/commit/?id=502f6a6d08b08c04b3ddfb1cd21b2f699c1b7f5b</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in REDHAT-BUG-1338700 is classified as a format string vulnerability that could potentially lead to code execution.
To fix REDHAT-BUG-1338700, upgrade the libxml2 library to the latest version that includes the security patch.
The impact of REDHAT-BUG-1338700 includes possible unauthorized access and execution of arbitrary code on affected systems.
As of now, there are no reports indicating that REDHAT-BUG-1338700 is actively being exploited in the wild.
Specific versions of libxml2 that are vulnerable are not listed, so it is recommended to check your current version against the latest secure release.