This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
CVE-2015-7499 libxml2: Heap-based buffer overflow in xmlGROW
Product:
[Other] Security Response
Reporter:
Adam Mariš <amaris>
Component:
vulnerability Assignee:
Red Hat Product Security <security-response-team>
Status:
CLOSED
ERRATA
QA Contact:
Severity:
medium
Docs Contact:
Priority:
medium
Version:
unspecified CC:
csutherl, dknox, jclere, jdoyle, jrusnack, lgao, mbabacek, mcermak, mturk, myarboro, ohudlick, sardella, security-response-team, slawomir, twalsh, veillard, weli
Target Milestone:
--- Keywords:
Security
Target Release:
---
Hardware:
All
OS:
Linux
Whiteboard:
Fixed In Version:
Doc Type:
Bug Fix
Doc Text:
A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to leak potentially sensitive information.
Story Points:
---
Clone Of:
Environment:
Last Closed:
2019-06-08 02:45:18 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
Bug Depends On:
1284794 , 1286495 , 1286496 , 1286497 , 1323031
Bug Blocks:
1274223 , 1281960 , 1318206
Attachments: