CVE-2015-7499: Heap-based buffer overflow vulnerability in libxml2
(updated )
Heap-based buffer overflow in the xmlGROW function in parser.c
in libxml2 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors. It was discovered that libxml2 incorrectly handled certain malformed documents. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service.
References
Detect and mitigate CVE-2015-7499 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →