First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-use-after free can happen in the xmlDictComputeFastKey. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=759398">https://bugzilla.gnome.org/show_bug.cgi?id=759398</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0">https://git.gnome.org/browse/libxml2/commit/?id=45752d2c334b50016666d8f0ec3691e2d680f0a0</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338702 is considered high due to the potential for a heap-use-after-free vulnerability.
To fix REDHAT-BUG-1338702, update the libxml2 library to the latest version provided by your distribution.
REDHAT-BUG-1338702 affects systems using the libxml2 library, particularly those in GNOME environments.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-1338702.
Symptoms of REDHAT-BUG-1338702 may include application crashes or unexpected behavior when processing XML files.