Issue metadata
Sign in to add a comment
|
Chromium: Vulnerability reported in libxml |
||||||||||||||||||
Issue descriptionAutomated analysis has detected that the following third party packages have had vulnerabilities publicly reported. NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package. Package Name: libxml Package Version: [cpe:/a:xmlsoft:libxml2:2.7.7] Advisory: CVE-2016-9596 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-9596 CVSS severity score: 4.3/10.0 Confidence: high Description: libxml2, as used in Red Hat JBoss Core Services and when in recovery mode, allows context-dependent attackers to cause a denial of service (stack consumption) via a crafted XML document. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-3627. Advisory: CVE-2016-9598 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-9598 CVSS severity score: 4.3/10.0 Confidence: high Description: libxml2, as used in Red Hat JBoss Core Services, allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted XML document. NOTE: this vulnerability exists because of a missing fix for CVE-2016-4483.
,
Oct 17
Issue 896216 has been merged into this issue.
,
Today
(17 hours ago)
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||
Comment 1 by infe...@chromium.org
, Oct 16