4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
The libxml2 library is a development toolbox providing the implementation of various XML standards. Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) Red Hat would like to thank the GNOME project for reporting CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500, CVE-2015-8241, CVE-2015-8242, and CVE-2015-8317. Upstream acknowledges Kostya Serebryany of Google as the original reporter of CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, and CVE-2015-7500; Hugh Davenport as the original reporter of CVE-2015-8241 and CVE-2015-8242; and Hanno Boeck as the original reporter of CVE-2015-8317. All libxml2 users are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. The desktop must be restarted (log out, then log back in) for this update to take effect.
lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html
lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html
lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
marc.info/?l=bugtraq&m=145382616617563&w=2
rhn.redhat.com/errata/RHSA-2015-2549.html
rhn.redhat.com/errata/RHSA-2015-2550.html
rhn.redhat.com/errata/RHSA-2016-1089.html
www.debian.org/security/2015/dsa-3430
www.openwall.com/lists/oss-security/2015/10/22/5
www.openwall.com/lists/oss-security/2015/10/22/8
www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
www.securityfocus.com/bid/74241
www.securitytracker.com/id/1034243
www.ubuntu.com/usn/USN-2812-1
xmlsoft.org/news.html
access.redhat.com/security/cve/CVE-2015-8710
access.redhat.com/security/updates/classification/#moderate
bugzilla.gnome.org/show_bug.cgi?id=744980
bugzilla.redhat.com/show_bug.cgi?id=1281955
git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489
git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31
h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
rhn.redhat.com/errata/RHSA-2015-2549.html
security.gentoo.org/glsa/201701-37