First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. The parser would fetch content of an external entity while not in validating mode. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=761430">https://bugzilla.gnome.org/show_bug.cgi?id=761430</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5">https://git.gnome.org/browse/libxml2/commit/?id=b1d34de46a11323fccffa9fadeb33be670d602f5</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338701 is considered critical due to potential remote code execution risks.
To fix REDHAT-BUG-1338701, you should upgrade to the latest version of the libxml2 library that includes the security patch.
REDHAT-BUG-1338701 affects systems using the vulnerable versions of the libxml2 library.
While there are no official workarounds for REDHAT-BUG-1338701, disabling external entity parsing may reduce risk.
The potential impacts of REDHAT-BUG-1338701 include unauthorized access to sensitive data and remote code execution vulnerabilities.