vulnerability

CentOS Linux: CVE-2015-8869: Moderate: libguestfs security and bug fix update (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
2016-06-13
Added
2016-07-22
Modified
2023-05-25

Description

OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.

Solution(s)

centos-upgrade-libguestfscentos-upgrade-libguestfs-debuginfocentos-upgrade-libguestfs-develcentos-upgrade-libguestfs-javacentos-upgrade-libguestfs-java-develcentos-upgrade-libguestfs-javadoccentos-upgrade-libguestfs-toolscentos-upgrade-libguestfs-tools-ccentos-upgrade-ocamlcentos-upgrade-ocaml-camlp4centos-upgrade-ocaml-camlp4-develcentos-upgrade-ocaml-debuginfocentos-upgrade-ocaml-docscentos-upgrade-ocaml-emacscentos-upgrade-ocaml-labltkcentos-upgrade-ocaml-labltk-develcentos-upgrade-ocaml-libguestfscentos-upgrade-ocaml-libguestfs-develcentos-upgrade-ocaml-ocamldoccentos-upgrade-ocaml-runtimecentos-upgrade-ocaml-sourcecentos-upgrade-ocaml-x11centos-upgrade-perl-sys-guestfscentos-upgrade-python-libguestfscentos-upgrade-ruby-libguestfs
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.