First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-buffer-overflow could happen in xmlStrncat. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=763071">https://bugzilla.gnome.org/show_bug.cgi?id=763071</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704">https://git.gnome.org/browse/libxml2/commit/?id=8fbbf5513d609c1770b391b99e33314cd0742704</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1338708 is considered high due to the potential for a heap-buffer-overflow in the libxml2 library.
To fix REDHAT-BUG-1338708, upgrade the libxml2 library to the latest version that includes the upstream patch.
REDHAT-BUG-1338708 affects the libxml2 library used in various applications that rely on XML parsing.
REDHAT-BUG-1338708 is classified as a heap-buffer-overflow vulnerability, which can lead to application crashes or unauthorized code execution.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-1338708.