The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libxml2-dev": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-utils-dbgsym": "2.9.1+dfsg1-3ubuntu4.6", "python-libxml2-dbgsym": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-utils": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-doc": "2.9.1+dfsg1-3ubuntu4.6", "python-libxml2": "2.9.1+dfsg1-3ubuntu4.6", "libxml2": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-udeb-dbgsym": "2.9.1+dfsg1-3ubuntu4.6", "python-libxml2-dbg": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-dbgsym": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-utils-dbg": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-dev-dbgsym": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-dbg": "2.9.1+dfsg1-3ubuntu4.6", "libxml2-udeb": "2.9.1+dfsg1-3ubuntu4.6" } ] }