First published: Fri Nov 13 2015(Updated: )
A heap-based buffer overflow vulnerability was found in xmlDictComputeFastQKey in dict.c. Upstream bug: <a href="https://bugzilla.gnome.org/show_bug.cgi?id=756528">https://bugzilla.gnome.org/show_bug.cgi?id=756528</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
Gnome Libxml2 | <=2.9.2 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise linux hpc node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
HP IceWall Federation Agent | =3.0 | |
HP Icewall File Manager | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7497 is classified as a high severity vulnerability due to the potential for remote code execution caused by the heap-based buffer overflow.
To fix CVE-2015-7497, update the affected libxml2 package to version 2.9.3 or later, which resolves the buffer overflow issue.
CVE-2015-7497 affects various distributions including Debian 7.0, Debian 8.0, Ubuntu 12.04, 14.04, 15.04, and 15.10, as well as Red Hat Enterprise Linux 6.0.
The impact of CVE-2015-7497 could potentially allow an attacker to exploit the vulnerability to execute arbitrary code on the affected systems.
CVE-2015-7497 was reported in 2015 and is associated with the function xmlDictComputeFastQKey in the libxml2 library.