Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (3)
| Vulnerability |
Summary |
Aliases |
|
VCID-6h9f-6pmg-3fh3
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
libxml2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
|
CVE-2015-7941
|
|
VCID-b5tz-9s1v-pkg7
|
Vulnerabilities in libxml2 and libxslt
Several vulnerabilities were discovered in the libxml2 and libxslt libraries that this package gem depends on.
|
CVE-2015-1819
GHSA-q7wx-62r7-j2x7
|
|
VCID-cgfv-pps6-6khd
|
Improper Restriction of Operations within the Bounds of a Memory Buffer
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
|
CVE-2015-8710
|