|Bugzilla:||771896: CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name|
The MITRE CVE dictionary describes this issue as:
Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
This issue affected the versions of libxml2 as shipped with Red Hat Enterprise Linux 4, 5 and 6 and has been addressed via RHSA-2012:0016, RHSA-2012:0017 and RHSA-2012:0018 respectively. This issue affects the version of mingw32-libxml2 as shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue in Red Hat Enterprise Linux 6.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|Red Hat Enterprise Linux EUS (v. 5.6 server) (libxml2)||RHSA-2012:0104||February 08, 2012|
|Red Hat Enterprise Linux version 4 (libxml2)||RHSA-2012:0016||January 11, 2012|
|Red Hat Enterprise Linux version 5 (libxml2)||RHSA-2012:0017||January 11, 2012|
|Red Hat Enterprise Linux version 6 (libxml2)||RHSA-2012:0018||January 11, 2012|
|Red Hat Enterprise Linux version 6 (mingw32-libxml2)||RHSA-2013:0217||January 31, 2013|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.