ALT-BU-2015-2821-1
Branch c6 update bulletin.
Closed vulnerabilities
Modified: 2016-11-28
BDU:2015-06127
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06128
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06129
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06130
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06131
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09142
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09143
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09144
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09145
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09146
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-30
BDU:2015-09819
Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить целостность и доступность передаваемой защищаемой информации
Modified: 2017-06-21
BDU:2015-09905
Уязвимости системы автоматизации деятельности предприятия 1С:Предприятие, позволяющие злоумышленнику вызвать отказ в обслуживании или получить доступ к зашифрованным данным без знания ключа шифрования
Modified: 2021-03-23
BDU:2015-09960
Уязвимость программной платформы Java Platform, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
Modified: 2021-03-23
BDU:2015-09963
Уязвимость программной платформы JRockit, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
Modified: 2021-03-23
BDU:2015-09980
Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71934
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71934
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3570
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71939
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71939
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3571
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71937
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://www.openssl.org/news/secadv_20150108.txt
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71937
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3572
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71942
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71942
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-8275
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71935
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71935
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://support.novell.com/security/cve/CVE-2015-0204.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71936
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa91
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99707
- https://freakattack.com/
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://support.novell.com/security/cve/CVE-2015-0204.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71936
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa91
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99707
- https://freakattack.com/
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0205
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71941
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99708
- https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71941
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99708
- https://github.com/openssl/openssl/commit/1421e0c584ae9120ca1b88098f13d6d2e90b83a3
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2015-0206
Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71940
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99704
- https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://www.openssl.org/news/secadv_20150108.txt
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71940
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99704
- https://github.com/openssl/openssl/commit/103b171d8fc282ef435f8de9afbf7782e312961f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://www.openssl.org/news/secadv_20150108.txt
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-01741
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-07-05
BDU:2015-04278
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04279
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04280
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04281
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04282
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09737
Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09788
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-28
BDU:2020-04521
Уязвимость системы межпроцессорного взаимодействия D-Bus, вызванная ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2013-2168
The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
- http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7
- http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html
- http://lists.freedesktop.org/archives/dbus/2013-June/015696.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/53317
- http://secunia.com/advisories/53832
- http://www.debian.org/security/2013/dsa-2707
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:177
- http://www.openwall.com/lists/oss-security/2013/06/13/2
- http://www.securityfocus.com/bid/60546
- http://www.securitytracker.com/id/1028667
- http://www.ubuntu.com/usn/USN-1874-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974109
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881
- http://cgit.freedesktop.org/dbus/dbus/commit/?id=954d75b2b64e4799f360d2a6bf9cff6d9fee37e7
- http://lists.fedoraproject.org/pipermail/package-announce/2013-June/109896.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-June/110114.html
- http://lists.freedesktop.org/archives/dbus/2013-June/015696.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/53317
- http://secunia.com/advisories/53832
- http://www.debian.org/security/2013/dsa-2707
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:177
- http://www.openwall.com/lists/oss-security/2013/06/13/2
- http://www.securityfocus.com/bid/60546
- http://www.securitytracker.com/id/1028667
- http://www.ubuntu.com/usn/USN-1874-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974109
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16881
Modified: 2025-04-12
CVE-2014-3477
The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
- http://advisories.mageia.org/MGASA-2014-0266.html
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://seclists.org/oss-sec/2014/q2/509
- http://secunia.com/advisories/59428
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.securityfocus.com/bid/67986
- https://bugs.freedesktop.org/show_bug.cgi?id=78979
- http://advisories.mageia.org/MGASA-2014-0266.html
- http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://seclists.org/oss-sec/2014/q2/509
- http://secunia.com/advisories/59428
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.securityfocus.com/bid/67986
- https://bugs.freedesktop.org/show_bug.cgi?id=78979
Modified: 2025-04-12
CVE-2014-3533
dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
- http://advisories.mageia.org/MGASA-2014-0294.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://bugs.freedesktop.org/show_bug.cgi?id=79694
- https://bugs.freedesktop.org/show_bug.cgi?id=80469
- http://advisories.mageia.org/MGASA-2014-0294.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://openwall.com/lists/oss-security/2014/07/02/4
- http://secunia.com/advisories/59611
- http://secunia.com/advisories/59798
- http://secunia.com/advisories/60236
- http://www.debian.org/security/2014/dsa-2971
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- https://bugs.freedesktop.org/show_bug.cgi?id=79694
- https://bugs.freedesktop.org/show_bug.cgi?id=80469
Modified: 2025-04-12
CVE-2014-3635
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=83622
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=83622
Modified: 2025-04-12
CVE-2014-3636
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=82820
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=82820
Modified: 2025-04-12
CVE-2014-3637
D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.openwall.com/lists/oss-security/2019/06/24/13
- http://www.openwall.com/lists/oss-security/2019/06/24/14
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=80559
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.openwall.com/lists/oss-security/2019/06/24/13
- http://www.openwall.com/lists/oss-security/2019/06/24/14
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=80559
Modified: 2025-04-12
CVE-2014-3638
The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=81053
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=81053
Modified: 2025-04-12
CVE-2014-3639
The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=80919
- http://advisories.mageia.org/MGASA-2014-0395.html
- http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
- http://secunia.com/advisories/61378
- http://secunia.com/advisories/61431
- http://www.debian.org/security/2014/dsa-3026
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2014/09/16/9
- http://www.securitytracker.com/id/1030864
- http://www.ubuntu.com/usn/USN-2352-1
- https://bugs.freedesktop.org/show_bug.cgi?id=80919
Modified: 2025-04-12
CVE-2015-0245
D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://advisories.mageia.org/MGASA-2015-0071.html
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
- http://www.debian.org/security/2015/dsa-3161
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
- http://www.openwall.com/lists/oss-security/2015/02/09/6
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-02885
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-07-05
BDU:2015-04349
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04350
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04351
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04352
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04353
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04354
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-04355
Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05507
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05508
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05509
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05510
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05511
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05512
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05513
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05514
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05515
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05516
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05517
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05518
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05519
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05520
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05521
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05522
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05523
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05524
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05525
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05526
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05527
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06384
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06385
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06387
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06389
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-29
BDU:2015-06428
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06429
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-25
BDU:2015-06430
Множественные уязвимости пакета mingw32-libxml2-static-2.7.6 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07045
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07047
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07048
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07049
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07050
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-07409
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08639
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08640
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-08641
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09022
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09023
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09024
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09025
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09191
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09192
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09193
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09194
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09195
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09196
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-29
BDU:2015-09421
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09713
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-28
BDU:2015-09789
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2024-11-28
BDU:2016-01642
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2016-01643
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2016-01644
Уязвимость библиотеки libxml2, позволяющая нарушителю получить доступ к защищаемой информации из памяти процесса
Modified: 2024-11-28
BDU:2016-01645
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2016-01646
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании или получить конфиденциальную информацию
Modified: 2024-11-28
BDU:2016-01647
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании или получить конфиденциальную информацию
Modified: 2024-11-28
BDU:2016-01648
Уязвимость библиотеки libxml2, позволяющая нарушителю получить конфиденциальную информацию
Modified: 2021-03-23
BDU:2016-01649
Уязвимость библиотеки libxml2, позволяющая нарушителю получить конфиденциальную информацию, вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2021-03-23
BDU:2016-01665
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании или читать произвольные файлы
Modified: 2024-11-28
BDU:2016-01666
Уязвимость библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-11
CVE-2010-4494
Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
- http://code.google.com/p/chromium/issues/detail?id=63444
- http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/40775
- http://secunia.com/advisories/42472
- http://secunia.com/advisories/42721
- http://secunia.com/advisories/42762
- http://support.apple.com/kb/HT4554
- http://support.apple.com/kb/HT4564
- http://support.apple.com/kb/HT4566
- http://support.apple.com/kb/HT4581
- http://www.debian.org/security/2010/dsa-2137
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:260
- http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://www.vupen.com/english/advisories/2010/3319
- http://www.vupen.com/english/advisories/2010/3336
- http://www.vupen.com/english/advisories/2011/0230
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916
- http://code.google.com/p/chromium/issues/detail?id=63444
- http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates.html
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00003.html
- http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055775.html
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- http://marc.info/?l=bugtraq&m=139447903326211&w=2
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/40775
- http://secunia.com/advisories/42472
- http://secunia.com/advisories/42721
- http://secunia.com/advisories/42762
- http://support.apple.com/kb/HT4554
- http://support.apple.com/kb/HT4564
- http://support.apple.com/kb/HT4566
- http://support.apple.com/kb/HT4581
- http://www.debian.org/security/2010/dsa-2137
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:260
- http://www.openoffice.org/security/cves/CVE-2010-4008_CVE-2010-4494.html
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://www.vupen.com/english/advisories/2010/3319
- http://www.vupen.com/english/advisories/2010/3336
- http://www.vupen.com/english/advisories/2011/0230
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11916
Modified: 2025-04-11
CVE-2011-1944
Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
- http://git.gnome.org/browse/libxml2/commit/?id=d7958b21e7f8c447a26bb2436f08402b2c308be4
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062238.html
- http://lists.opensuse.org/opensuse-updates/2011-07/msg00035.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://scarybeastsecurity.blogspot.com/2011/05/libxml-vulnerability-and-interesting.html
- http://secunia.com/advisories/44711
- http://support.apple.com/kb/HT5281
- http://support.apple.com/kb/HT5503
- http://ubuntu.com/usn/usn-1153-1
- http://www.debian.org/security/2011/dsa-2255
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:131
- http://www.openwall.com/lists/oss-security/2011/05/31/8
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.osvdb.org/73248
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://www.securityfocus.com/bid/48056
- https://bugzilla.redhat.com/show_bug.cgi?id=709747
- http://git.gnome.org/browse/libxml2/commit/?id=d7958b21e7f8c447a26bb2436f08402b2c308be4
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062238.html
- http://lists.opensuse.org/opensuse-updates/2011-07/msg00035.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://scarybeastsecurity.blogspot.com/2011/05/libxml-vulnerability-and-interesting.html
- http://secunia.com/advisories/44711
- http://support.apple.com/kb/HT5281
- http://support.apple.com/kb/HT5503
- http://ubuntu.com/usn/usn-1153-1
- http://www.debian.org/security/2011/dsa-2255
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:131
- http://www.openwall.com/lists/oss-security/2011/05/31/8
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.osvdb.org/73248
- http://www.redhat.com/support/errata/RHSA-2011-1749.html
- http://www.securityfocus.com/bid/48056
- https://bugzilla.redhat.com/show_bug.cgi?id=709747
Modified: 2025-04-11
CVE-2012-0841
libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
- http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-0324.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://securitytracker.com/id?1026723
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2417
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://www.openwall.com/lists/oss-security/2012/02/22/1
- http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
- http://www.securityfocus.com/bid/52107
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- http://xmlsoft.org/news.html
- https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846
- http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-0324.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://securitytracker.com/id?1026723
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2417
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- http://www.openwall.com/lists/oss-security/2012/02/22/1
- http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html
- http://www.securityfocus.com/bid/52107
- http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
- http://xmlsoft.org/news.html
- https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of
Modified: 2025-04-11
CVE-2012-2871
libxml2 2.9.0-rc1 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h.
- http://code.google.com/p/chromium/issues/detail?id=138673
- http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html
- http://secunia.com/advisories/50838
- http://secunia.com/advisories/54886
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?r1=56276&r2=149930
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?view=log
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2555
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:164
- https://chromiumcodereview.appspot.com/10824157
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78179
- http://code.google.com/p/chromium/issues/detail?id=138673
- http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html
- http://secunia.com/advisories/50838
- http://secunia.com/advisories/54886
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?r1=56276&r2=149930
- http://src.chromium.org/viewvc/chrome/trunk/src/third_party/libxml/src/include/libxml/tree.h?view=log
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2555
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:164
- https://chromiumcodereview.appspot.com/10824157
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78179
Modified: 2025-04-11
CVE-2012-5134
Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
- http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
- http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-1512.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/51448
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2580
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
- http://www.securityfocus.com/bid/56684
- http://www.securitytracker.com/id?1027815
- http://www.ubuntu.com/usn/USN-1656-1
- https://bugzilla.redhat.com/show_bug.cgi?id=880466
- https://code.google.com/p/chromium/issues/detail?id=158249
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
- http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d
- http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
- http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://rhn.redhat.com/errata/RHSA-2012-1512.html
- http://rhn.redhat.com/errata/RHSA-2013-0217.html
- http://secunia.com/advisories/51448
- http://secunia.com/advisories/54886
- http://secunia.com/advisories/55568
- http://support.apple.com/kb/HT5934
- http://support.apple.com/kb/HT6001
- http://www.debian.org/security/2012/dsa-2580
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
- http://www.securityfocus.com/bid/56684
- http://www.securitytracker.com/id?1027815
- http://www.ubuntu.com/usn/USN-1656-1
- https://bugzilla.redhat.com/show_bug.cgi?id=880466
- https://code.google.com/p/chromium/issues/detail?id=158249
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80294
Modified: 2025-04-11
CVE-2013-0338
libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html
- http://marc.info/?l=bugtraq&m=142798889927587&w=2
- http://secunia.com/advisories/52662
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2652
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.ubuntu.com/usn/USN-1782-1
- https://bugzilla.redhat.com/show_bug.cgi?id=912400
- https://git.gnome.org/browse/libxml2/commit/?id=23f05e0c33987d6605387b300c4be5da2120a7ab
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00112.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00114.html
- http://marc.info/?l=bugtraq&m=142798889927587&w=2
- http://secunia.com/advisories/52662
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2652
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:056
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.ubuntu.com/usn/USN-1782-1
- https://bugzilla.redhat.com/show_bug.cgi?id=912400
- https://git.gnome.org/browse/libxml2/commit/?id=23f05e0c33987d6605387b300c4be5da2120a7ab
Modified: 2025-04-11
CVE-2013-0339
libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE.
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://openwall.com/lists/oss-security/2013/02/21/24
- http://openwall.com/lists/oss-security/2013/02/22/3
- http://seclists.org/oss-sec/2013/q4/182
- http://seclists.org/oss-sec/2013/q4/184
- http://seclists.org/oss-sec/2013/q4/188
- http://secunia.com/advisories/52662
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2652
- http://www.openwall.com/lists/oss-security/2013/04/12/6
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- https://bugzilla.redhat.com/show_bug.cgi?id=915149
- https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://openwall.com/lists/oss-security/2013/02/21/24
- http://openwall.com/lists/oss-security/2013/02/22/3
- http://seclists.org/oss-sec/2013/q4/182
- http://seclists.org/oss-sec/2013/q4/184
- http://seclists.org/oss-sec/2013/q4/188
- http://secunia.com/advisories/52662
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2652
- http://www.openwall.com/lists/oss-security/2013/04/12/6
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- https://bugzilla.redhat.com/show_bug.cgi?id=915149
- https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
Modified: 2025-04-11
CVE-2013-2877
parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019
- ftp://xmlsoft.org/libxml2/libxml2-2.9.0.tar.gz
- http://git.chromium.org/gitweb/?p=chromium/chromium.git%3Ba=commit%3Bh=e5d7f7e5dc21d3ae7be3cbb949ac4d8701e06de1
- http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html
- http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00063.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00077.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/54172
- http://secunia.com/advisories/55568
- http://www.debian.org/security/2013/dsa-2724
- http://www.debian.org/security/2013/dsa-2779
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/61050
- http://www.ubuntu.com/usn/USN-1904-1
- http://www.ubuntu.com/usn/USN-1904-2
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://code.google.com/p/chromium/issues/detail?id=229019
Modified: 2025-04-12
CVE-2014-3660
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://rhn.redhat.com/errata/RHSA-2014-1655.html
- http://rhn.redhat.com/errata/RHSA-2014-1885.html
- http://secunia.com/advisories/59903
- http://secunia.com/advisories/61965
- http://secunia.com/advisories/61966
- http://secunia.com/advisories/61991
- http://www.debian.org/security/2014/dsa-3057
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
- http://www.openwall.com/lists/oss-security/2014/10/17/7
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/70644
- http://www.ubuntu.com/usn/USN-2389-1
- https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
- https://bugzilla.redhat.com/show_bug.cgi?id=1149084
- https://support.apple.com/kb/HT205030
- https://support.apple.com/kb/HT205031
- https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00002.html
- http://lists.opensuse.org/opensuse-updates/2014-10/msg00034.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://rhn.redhat.com/errata/RHSA-2014-1655.html
- http://rhn.redhat.com/errata/RHSA-2014-1885.html
- http://secunia.com/advisories/59903
- http://secunia.com/advisories/61965
- http://secunia.com/advisories/61966
- http://secunia.com/advisories/61991
- http://www.debian.org/security/2014/dsa-3057
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:244
- http://www.openwall.com/lists/oss-security/2014/10/17/7
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/70644
- http://www.ubuntu.com/usn/USN-2389-1
- https://bugzilla.redhat.com/attachment.cgi?id=944444&action=diff
- https://bugzilla.redhat.com/show_bug.cgi?id=1149084
- https://support.apple.com/kb/HT205030
- https://support.apple.com/kb/HT205031
- https://www.ncsc.nl/actueel/nieuwsberichten/kwetsbaarheid-ontdekt-in-libxml2.html
Modified: 2025-04-12
CVE-2015-5312
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79536
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1276693
- https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79536
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1276693
- https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
Modified: 2025-04-12
CVE-2015-7497
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79508
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281862
- https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79508
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281862
- https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
Modified: 2025-04-12
CVE-2015-7498
Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79548
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281879
- https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79548
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281879
- https://git.gnome.org/browse/libxml2/commit/?id=afd27c21f6b36e22682b7da20d726bce2dcb2f43
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
Modified: 2025-04-12
CVE-2015-7499
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79509
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281925
- https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
- https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79509
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281925
- https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc
- https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
Modified: 2025-04-12
CVE-2015-7500
The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79562
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281943
- https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/79562
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1281943
- https://git.gnome.org/browse/libxml2/commit/?id=f1063fdbe7fa66332bbb76874101c2a7b51b519f
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
Modified: 2025-04-12
CVE-2015-8241
The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77621
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.gnome.org/show_bug.cgi?id=756263
- https://bugzilla.redhat.com/show_bug.cgi?id=1281936
- https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77621
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- https://bugzilla.gnome.org/show_bug.cgi?id=756263
- https://bugzilla.redhat.com/show_bug.cgi?id=1281936
- https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
Modified: 2025-04-12
CVE-2015-8242
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77681
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.gnome.org/show_bug.cgi?id=756372
- https://bugzilla.redhat.com/show_bug.cgi?id=1281950
- https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2015-2550.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.openwall.com/lists/oss-security/2015/11/17/5
- http://www.openwall.com/lists/oss-security/2015/11/18/23
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77681
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- http://xmlsoft.org/news.html
- https://bugzilla.gnome.org/show_bug.cgi?id=756372
- https://bugzilla.redhat.com/show_bug.cgi?id=1281950
- https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://security.gentoo.org/glsa/201701-37
- https://support.apple.com/HT206166
- https://support.apple.com/HT206167
- https://support.apple.com/HT206168
- https://support.apple.com/HT206169
Modified: 2025-04-12
CVE-2015-8317
The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/11/21/1
- http://www.openwall.com/lists/oss-security/2015/11/22/3
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77681
- http://www.securityfocus.com/bid/91826
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html
- https://bugzilla.gnome.org/show_bug.cgi?id=751603
- https://bugzilla.gnome.org/show_bug.cgi?id=751631
- https://bugzilla.redhat.com/show_bug.cgi?id=1281930
- https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
- https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html
- http://marc.info/?l=bugtraq&m=145382616617563&w=2
- http://rhn.redhat.com/errata/RHSA-2015-2549.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/11/21/1
- http://www.openwall.com/lists/oss-security/2015/11/22/3
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77681
- http://www.securityfocus.com/bid/91826
- http://www.securitytracker.com/id/1034243
- http://www.ubuntu.com/usn/USN-2834-1
- https://blog.fuzzing-project.org/28-Libxml2-Several-out-of-bounds-reads.html
- https://bugzilla.gnome.org/show_bug.cgi?id=751603
- https://bugzilla.gnome.org/show_bug.cgi?id=751631
- https://bugzilla.redhat.com/show_bug.cgi?id=1281930
- https://git.gnome.org/browse/libxml2/commit/?id=709a952110e98621c9b78c4f26462a9d8333102e
- https://git.gnome.org/browse/libxml2/commit/?id=9aa37588ee78a06ca1379a9d9356eab16686099c
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
Modified: 2025-04-12
CVE-2015-8710
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/04/19/4
- http://www.openwall.com/lists/oss-security/2015/09/13/1
- http://www.openwall.com/lists/oss-security/2015/12/31/7
- http://www.securityfocus.com/bid/79811
- https://bugzilla.gnome.org/show_bug.cgi?id=746048
- https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
- https://hackerone.com/reports/57125#activity-384861
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://www.debian.org/security/2015/dsa-3430
- http://www.openwall.com/lists/oss-security/2015/04/19/4
- http://www.openwall.com/lists/oss-security/2015/09/13/1
- http://www.openwall.com/lists/oss-security/2015/12/31/7
- http://www.securityfocus.com/bid/79811
- https://bugzilla.gnome.org/show_bug.cgi?id=746048
- https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
- https://hackerone.com/reports/57125#activity-384861
Closed bugs
Обновить