First published: Thu Feb 06 2020(Updated: )
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation. Reference and upstream commit: <a href="https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076">https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076</a>
Affected Software | Affected Version | How to fix |
---|---|---|
libxml2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1799786 is considered high due to the potential for an infinite loop in the libxml2 parser leading to denial of service.
To fix REDHAT-BUG-1799786, update libxml2 to a version that has implemented the upstream commit addressing this vulnerability.
The affected software for REDHAT-BUG-1799786 is libxml2 version 2.9.10.
The vulnerability in REDHAT-BUG-1799786 is an infinite loop that occurs in the xmlStringLenDecodeEntities function under certain end-of-file conditions.
As of now, there are no publicly disclosed exploits specifically targeting REDHAT-BUG-1799786.