In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for RHEL:6
libxml2-static
.
Note: Versions mentioned in the description apply only to the upstream libxml2-static
package and not the libxml2-static
package as distributed by RHEL
.
See How to fix?
for RHEL:6
relevant fixed versions and status.
Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions xmlXPathRunEval
, xmlXPathCtxtCompile
, and xmlXPathEvalExpr
were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.