First published: Thu Mar 30 2017(Updated: )
xmlsec is vulnerable to XML External Entity Expansion via libxml2 (see <a href="https://access.redhat.com/security/cve/CVE-2016-9318">CVE-2016-9318</a>). A workaround is in progress on the upstream bug report. Upstream bug: <a href="https://github.com/lsh123/xmlsec/issues/43">https://github.com/lsh123/xmlsec/issues/43</a>
Affected Software | Affected Version | How to fix |
---|---|---|
xmlsec | ||
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1437311 is classified as a moderate vulnerability due to potential XML External Entity Expansion.
To fix REDHAT-BUG-1437311, you should apply any available patches for xmlsec and libxml2 once they are released.
REDHAT-BUG-1437311 affects xmlsec and libxml2 software components.
REDHAT-BUG-1437311 is an XML External Entity Expansion vulnerability.
Yes, a workaround is currently being developed as noted in the upstream bug report for REDHAT-BUG-1437311.