vulnerability
CentOS Linux: CVE-2015-8869: Moderate: libguestfs security and bug fix update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jun 13, 2016 | Jul 22, 2016 | May 25, 2023 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jun 13, 2016
Added
Jul 22, 2016
Modified
May 25, 2023
Description
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Solutions
centos-upgrade-libguestfscentos-upgrade-libguestfs-debuginfocentos-upgrade-libguestfs-develcentos-upgrade-libguestfs-javacentos-upgrade-libguestfs-java-develcentos-upgrade-libguestfs-javadoccentos-upgrade-libguestfs-toolscentos-upgrade-libguestfs-tools-ccentos-upgrade-ocamlcentos-upgrade-ocaml-camlp4centos-upgrade-ocaml-camlp4-develcentos-upgrade-ocaml-debuginfocentos-upgrade-ocaml-docscentos-upgrade-ocaml-emacscentos-upgrade-ocaml-labltkcentos-upgrade-ocaml-labltk-develcentos-upgrade-ocaml-libguestfscentos-upgrade-ocaml-libguestfs-develcentos-upgrade-ocaml-ocamldoccentos-upgrade-ocaml-runtimecentos-upgrade-ocaml-sourcecentos-upgrade-ocaml-x11centos-upgrade-perl-sys-guestfscentos-upgrade-python-libguestfscentos-upgrade-ruby-libguestfs
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.