vulnerability
Red Hat: CVE-2015-8869: Moderate: libguestfs security and bug fix update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | Jun 13, 2016 | Jul 29, 2016 | Mar 3, 2021 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
Jun 13, 2016
Added
Jul 29, 2016
Modified
Mar 3, 2021
Description
OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
Solutions
redhat-upgrade-libguestfsredhat-upgrade-libguestfs-debuginforedhat-upgrade-libguestfs-develredhat-upgrade-libguestfs-javaredhat-upgrade-libguestfs-java-develredhat-upgrade-libguestfs-javadocredhat-upgrade-libguestfs-toolsredhat-upgrade-libguestfs-tools-credhat-upgrade-ocamlredhat-upgrade-ocaml-camlp4redhat-upgrade-ocaml-camlp4-develredhat-upgrade-ocaml-debuginforedhat-upgrade-ocaml-docsredhat-upgrade-ocaml-emacsredhat-upgrade-ocaml-labltkredhat-upgrade-ocaml-labltk-develredhat-upgrade-ocaml-libguestfsredhat-upgrade-ocaml-libguestfs-develredhat-upgrade-ocaml-ocamldocredhat-upgrade-ocaml-runtimeredhat-upgrade-ocaml-sourceredhat-upgrade-ocaml-x11redhat-upgrade-perl-sys-guestfsredhat-upgrade-python-libguestfsredhat-upgrade-ruby-libguestfs
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.