Out-of-Bounds Affecting python3-libxml2-python package, versions <2.9.7-150000.3.60.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-PYTHON3LIBXML2PYTHON-5912990
- published 21 Sep 2023
- disclosed 20 Sep 2023
Introduced: 20 Sep 2023
CVE-2023-39615 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 python3-libxml2-python to version 2.9.7-150000.3.60.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3-libxml2-python package and not the python3-libxml2-python package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.