First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlDictAddString. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=758605">https://bugzilla.gnome.org/show_bug.cgi?id=758605</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33">https://git.gnome.org/browse/libxml2/commit/?id=a820dbeac29d330bae4be05d9ecd939ad6b4aa33</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338703 is considered to be high due to the potential for a heap-based buffer overread in the libxml2 library.
To fix REDHAT-BUG-1338703, users should update to the latest version of the libxml2 library that incorporates the necessary patches.
Specific versions of libxml2 that are affected by REDHAT-BUG-1338703 are not detailed, so it is recommended to check the release notes for your distribution.
Currently, no official workaround for REDHAT-BUG-1338703 has been provided, so applying the update is the best course of action.
Libxml2 is a software library used for parsing XML documents, and the vulnerability REDHAT-BUG-1338703 involves a flaw within this library.