Out-of-Bounds Affecting python3-libxml2 package, versions <0:2.9.7-16.el8_8.2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PYTHON3LIBXML2-6093647
- published 29 Nov 2023
- disclosed 29 Aug 2023
Introduced: 29 Aug 2023
CVE-2023-39615 Open this link in a new tabHow to fix?
Upgrade RHEL:8 python3-libxml2 to version 0:2.9.7-16.el8_8.2 or higher.
This issue was patched in RHSA-2023:7544.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3-libxml2 package and not the python3-libxml2 package as distributed by RHEL.
See How to fix? for RHEL:8 relevant fixed versions and status.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.