First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-buffer overflow could happen in xmlFAParsePosCharGroup References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=757711">https://bugzilla.gnome.org/show_bug.cgi?id=757711</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4">https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338706 is considered critical due to the potential for a heap-buffer overflow.
To fix REDHAT-BUG-1338706, update the libxml2 library to the latest patched version provided by your vendor.
REDHAT-BUG-1338706 primarily affects systems that utilize the libxml2 library.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-1338706.
REDHAT-BUG-1338706 was reported on August 31, 2016.