First published: Wed Dec 06 2017(Updated: )
A use-after-free flaw was found in the libxml2 library. An attacker could use this flaw to cause an application linked against libxml2 to crash when parsing a specially crafted XML file.
Credit: Nick Wellnh Nick Wellnh Nick Wellnh Nick Wellnh cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/nokogiri | <1.8.2 | 1.8.2 |
redhat/chromium-browser | <63.0.3239.84 | 63.0.3239.84 |
redhat/libxml2 | <2.9.6 | 2.9.6 |
redhat/chromium-browser | <0:63.0.3239.84-1.el6_9 | 0:63.0.3239.84-1.el6_9 |
redhat/libxml2 | <0:2.9.1-6.el7.4 | 0:2.9.1-6.el7.4 |
debian/libxml2 | 2.9.4+dfsg1-7+deb10u4 2.9.4+dfsg1-7+deb10u6 2.9.10+dfsg-6.7+deb11u4 2.9.14+dfsg-1.3~deb12u1 2.9.14+dfsg-1.3 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Google Chrome | <63.0.3239.84 | |
Xmlsoft Libxml2 | <2.9.5 | |
Apple watchOS | <4.3 | 4.3 |
Apple tvOS | <11.3 | 11.3 |
Apple iOS | <11.3 | 11.3 |
Apple macOS High Sierra | <10.13.4 | 10.13.4 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2017-15412 is a use after free vulnerability in libxml2 before version 2.9.5.
CVE-2017-15412 affects Google Chrome versions prior to 63.0.3239.84.
CVE-2017-15412 has a severity rating of 8.8 (High).
To fix CVE-2017-15412 in Google Chrome, update to version 63.0.3239.84 or later.
You can find more information about CVE-2017-15412 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2017-15412), [Red Hat Security Advisory 2017:3401](https://access.redhat.com/errata/RHSA-2017:3401), [Red Hat Security Advisory 2018:0287](https://access.redhat.com/errata/RHSA-2018:0287).