First published: Mon May 23 2016(Updated: )
A vulnerability was found in the libxml2 library. A heap-based buffer overread could happen in xmlNextChar. References: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=759671">https://bugzilla.gnome.org/show_bug.cgi?id=759671</a> Upstream fix: <a href="https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602">https://git.gnome.org/browse/libxml2/commit/?id=a7a94612aa3b16779e2c74e1fa353b5d9786c602</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1338711 has been classified as a moderate severity vulnerability.
To fix REDHAT-BUG-1338711, update the libxml2 library to the latest version provided by your distribution's package manager.
The potential impacts of REDHAT-BUG-1338711 include heap-based buffer overread which could lead to information leakage or application crashes.
The software affected by REDHAT-BUG-1338711 is the GNOME libxml2 library.
REDHAT-BUG-1338711 was reported in 2016.