Bug 1332820 (CVE-2016-4483)
Summary: | CVE-2016-4483 libxml2: out-of-bounds read | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | athmanem, c.david86, csutherl, erik-fedora, fedora-mingw, gzaronik, jclere, jwalter, leonard-rh-bugzilla, lgao, mbabacek, mturk, myarboro, ohudlick, rjones, sardella, slawomir, twalsh, veillard, weli | ||||
Target Milestone: | --- | Keywords: | Reopened, Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
See Also: |
https://issues.redhat.com/browse/JWS-442 https://issues.redhat.com/browse/JBCS-103 |
||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2021-10-21 00:52:26 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1332823, 1332824, 1332825, 1340369, 1340371 | ||||||
Bug Blocks: | 1332827, 1395463, 1434761 | ||||||
Attachments: |
|
Description
Andrej Nemec
2016-05-04 07:16:26 UTC
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1332823] Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1332824] Affects: epel-7 [bug 1332825] This issue has been addressed in the following products: Via RHSA-2016:2957 https://rhn.redhat.com/errata/RHSA-2016-2957.html CVE-2016-4483 is NOT a duplicate of CVE-2016-3627! This issue has NOT been fixed for at least RHEL6 (CVE-2016-3627 has been). This issue was fixed upstream with commit c97750d11bb8b6f3303e7131fe526a61ac65bcfd https://git.gnome.org/browse/libxml2/commit/?h=CVE-2016-4483&id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd Created attachment 1265117 [details] Fix for CVE-2016-4483, upstream commit c97750d11bb8b6f3303e7131fe526a61ac65bcfd Upstream commit that fixes CVE-2016-4483. CVE-2016-4483 has also NOT been fixed for RHEL7. Patch applies cleanly. (In reply to Leonard den Ottolander from comment #9) > CVE-2016-4483 is NOT a duplicate of CVE-2016-3627! > > This issue has NOT been fixed for at least RHEL6 (CVE-2016-3627 has been). > > This issue was fixed upstream with commit > c97750d11bb8b6f3303e7131fe526a61ac65bcfd > > https://git.gnome.org/browse/libxml2/commit/?h=CVE-2016- > 4483&id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd Thanks for the update: CVE-2016-3627 was fixed via: https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9 CVE-2016-4483 was fixed via: https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd Statement: When a specially-crafted XML file is parsed via an application compiled against libxml2, this can cause the application to crash. (No code execution) Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=766414 |