vulnerability
CentOS Linux: CVE-2015-8869: Moderate: libguestfs security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | 2016-06-13 | 2016-07-22 | 2023-05-25 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
2016-06-13
Added
2016-07-22
Modified
2023-05-25
Description
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Solution(s)
centos-upgrade-libguestfscentos-upgrade-libguestfs-debuginfocentos-upgrade-libguestfs-develcentos-upgrade-libguestfs-javacentos-upgrade-libguestfs-java-develcentos-upgrade-libguestfs-javadoccentos-upgrade-libguestfs-toolscentos-upgrade-libguestfs-tools-ccentos-upgrade-ocamlcentos-upgrade-ocaml-camlp4centos-upgrade-ocaml-camlp4-develcentos-upgrade-ocaml-debuginfocentos-upgrade-ocaml-docscentos-upgrade-ocaml-emacscentos-upgrade-ocaml-labltkcentos-upgrade-ocaml-labltk-develcentos-upgrade-ocaml-libguestfscentos-upgrade-ocaml-libguestfs-develcentos-upgrade-ocaml-ocamldoccentos-upgrade-ocaml-runtimecentos-upgrade-ocaml-sourcecentos-upgrade-ocaml-x11centos-upgrade-perl-sys-guestfscentos-upgrade-python-libguestfscentos-upgrade-ruby-libguestfs

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.