First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlParserPrintFileContextInternal References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=758588">https://bugzilla.gnome.org/show_bug.cgi?id=758588</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9">https://git.gnome.org/browse/libxml2/commit/?id=db07dd613e461df93dde7902c6505629bf0734e9</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338705 is categorized as moderate.
To fix REDHAT-BUG-1338705, you should update the libxml2 library to the latest patched version provided by your distribution.
REDHAT-BUG-1338705 affects systems that utilize the libxml2 library, particularly those running vulnerable versions.
Currently, there are no known effective workarounds for REDHAT-BUG-1338705 other than applying the recommended updates.
REDHAT-BUG-1338705 is a heap-based buffer overread vulnerability in the libxml2 library.