ID

VAR-201607-0235


CVE

CVE-2016-5131


TITLE

Google Chrome Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201607-919

DESCRIPTION

Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function. A use-after-free vulnerability exists in libxml2 2.9.4 and earlier versions used in Google Chrome versions earlier than 52.0.2743.82. CVE-2016-1704 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1705 The chrome development team found and fixed various issues during internal auditing. CVE-2016-1706 Pinkie Pie discovered a way to escape the Pepper Plugin API sandbox. CVE-2016-1709 ChenQin a buffer overflow issue in the sfntly library. CVE-2016-5128 A same-origin bypass issue was discovered in the v8 javascript library. CVE-2016-5132 Ben Kelly discovered a same-origin bypass. CVE-2016-5137 Xiaoyin Liu discovered a way to discover whether an HSTS web side had been visited. For the stable distribution (jessie), these problems have been fixed in version 52.0.2743.82-1~deb8u1. For the testing (stretch) and unstable (sid) distributions, these problems have been fixed in version 52.0.2743.82-1. We recommend that you upgrade your chromium-browser packages. Background ========== libxml2 is the XML (eXtended Markup Language) C parser and toolkit initially developed for the Gnome project. ========================================================================= Ubuntu Security Notice USN-3041-1 August 05, 2016 oxide-qt vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Oxide. Software Description: - oxide-qt: Web browser engine for Qt (QML plugin) Details: Multiple security issues were discovered in Chromium. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, cause a denial of service (application crash) or execute arbitrary code. (CVE-2016-1705) It was discovered that the PPAPI implementation does not validate the origin of IPC messages to the plugin broker process. A remote attacker could potentially exploit this to bypass sandbox protection mechanisms. (CVE-2016-1706) It was discovered that Blink does not prevent window creation by a deferred frame. A remote attacker could potentially exploit this to bypas s same origin restrictions. (CVE-2016-1710) It was discovered that Blink does not disable frame navigation during a detach operation on a DocumentLoader object. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-1711) A use-after-free was discovered in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5127) It was discovered that objects.cc in V8 does not prevent API interceptors from modifying a store target without setting a property. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-5128) A memory corruption was discovered in V8. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5129) A security issue was discovered in Chromium. A remote attacker could potentially exploit this to spoof the currently displayed URL. (CVE-2016-5130) A use-after-free was discovered in libxml. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploi t this to cause a denial of service via renderer process crash, or execute arbitrary code. (CVE-2016-5131) The Service Workers implementation in Chromium does not properly implemen t the Secure Contexts specification during decisions about whether to control a subframe. A remote attacker could potentially exploit this to bypass same origin restrictions. (CVE-2016-5132) It was discovered that Chromium mishandles origin information during prox y authentication. A man-in-the-middle attacker could potentially exploit th is to spoof a proxy authentication login prompt. (CVE-2016-5133) It was discovered that the Proxy Auto-Config (PAC) feature in Chromium does not ensure that URL information is restricted to a scheme, host and port. A remote attacker could potentially exploit this to obtain sensitiv e information. (CVE-2016-5134) It was discovered that Blink does not consider referrer-policy informatio n inside an HTML document during a preload request. A remote attacker could potentially exploit this to bypass Content Security Policy (CSP) protections. (CVE-2016-5135) It was discovered that the Content Security Policy (CSP) implementation i n Blink does not apply http :80 policies to https :443 URLs. A remote attacker could potentially exploit this to determine whether a specific HSTS web site has been visited by reading a CSP report. (CVE-2016-5137) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: liboxideqtcore0 1.16.5-0ubuntu0.16.04.1 Ubuntu 14.04 LTS: liboxideqtcore0 1.16.5-0ubuntu0.14.04.1 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: libxml2 security update Advisory ID: RHSA-2020:1190-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:1190 Issue date: 2020-03-31 CVE Names: CVE-2015-8035 CVE-2016-5131 CVE-2017-15412 CVE-2017-18258 CVE-2018-14404 CVE-2018-14567 ==================================================================== 1. Summary: An update for libxml2 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The libxml2 library is a development toolbox providing the implementation of various XML standards. Security Fix(es): * libxml2: Use after free triggered by XPointer paths beginning with range-to (CVE-2016-5131) * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c (CVE-2017-15412) * libxml2: DoS caused by incorrect error detection during XZ decompression (CVE-2015-8035) * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c (CVE-2018-14404) * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c (CVE-2017-18258) * libxml2: Infinite loop caused by incorrect error detection during LZMA decompression (CVE-2018-14567) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.8 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The desktop must be restarted (log out, then log back in) for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1277146 - CVE-2015-8035 libxml2: DoS caused by incorrect error detection during XZ decompression 1358641 - CVE-2016-5131 libxml2: Use after free triggered by XPointer paths beginning with range-to 1523128 - CVE-2017-15412 libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate() function in xpath.c 1566749 - CVE-2017-18258 libxml2: Unrestricted memory usage in xz_head() function in xzlib.c 1595985 - CVE-2018-14404 libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c 1619875 - CVE-2018-14567 libxml2: Infinite loop caused by incorrect error detection during LZMA decompression 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm ppc64: libxml2-2.9.1-6.el7.4.ppc.rpm libxml2-2.9.1-6.el7.4.ppc64.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64.rpm libxml2-devel-2.9.1-6.el7.4.ppc.rpm libxml2-devel-2.9.1-6.el7.4.ppc64.rpm libxml2-python-2.9.1-6.el7.4.ppc64.rpm ppc64le: libxml2-2.9.1-6.el7.4.ppc64le.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64le.rpm libxml2-devel-2.9.1-6.el7.4.ppc64le.rpm libxml2-python-2.9.1-6.el7.4.ppc64le.rpm s390x: libxml2-2.9.1-6.el7.4.s390.rpm libxml2-2.9.1-6.el7.4.s390x.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390x.rpm libxml2-devel-2.9.1-6.el7.4.s390.rpm libxml2-devel-2.9.1-6.el7.4.s390x.rpm libxml2-python-2.9.1-6.el7.4.s390x.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: libxml2-debuginfo-2.9.1-6.el7.4.ppc.rpm libxml2-debuginfo-2.9.1-6.el7.4.ppc64.rpm libxml2-static-2.9.1-6.el7.4.ppc.rpm libxml2-static-2.9.1-6.el7.4.ppc64.rpm ppc64le: libxml2-debuginfo-2.9.1-6.el7.4.ppc64le.rpm libxml2-static-2.9.1-6.el7.4.ppc64le.rpm s390x: libxml2-debuginfo-2.9.1-6.el7.4.s390.rpm libxml2-debuginfo-2.9.1-6.el7.4.s390x.rpm libxml2-static-2.9.1-6.el7.4.s390.rpm libxml2-static-2.9.1-6.el7.4.s390x.rpm x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libxml2-2.9.1-6.el7.4.src.rpm x86_64: libxml2-2.9.1-6.el7.4.i686.rpm libxml2-2.9.1-6.el7.4.x86_64.rpm libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-devel-2.9.1-6.el7.4.i686.rpm libxml2-devel-2.9.1-6.el7.4.x86_64.rpm libxml2-python-2.9.1-6.el7.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libxml2-debuginfo-2.9.1-6.el7.4.i686.rpm libxml2-debuginfo-2.9.1-6.el7.4.x86_64.rpm libxml2-static-2.9.1-6.el7.4.i686.rpm libxml2-static-2.9.1-6.el7.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-8035 https://access.redhat.com/security/cve/CVE-2016-5131 https://access.redhat.com/security/cve/CVE-2017-15412 https://access.redhat.com/security/cve/CVE-2017-18258 https://access.redhat.com/security/cve/CVE-2018-14404 https://access.redhat.com/security/cve/CVE-2018-14567 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXoOdR9zjgjWX9erEAQhgbQ/+JolcknqNffv7HQZNxYOtS/M2Zx/E3IB4 QwmkXhfmgV44ig4prUpghE/+O5eTUPjqSq6rHjih/pjCjG4bVcK6BptxBFi7WQwo GM0ryvm0p0fib0dy+Ov3NNC6Dhg32NIVwC0pWTIEdYcOGBfDY3mXlLXx5aHefisu p1C7F6rP4xxMRDOlQhAB4UPMkPSD/MtKIyxIEqiAT5olybSTl0um2AB5XtLlCbkT h4IXDsAyswvBIS/bxnyZkn6oHEiD3JBwcP+ZU0jgSEy34O92ttV7hRQb1H1+YHOO li1bX5IcbmFzATwBfCZQmNfrp/XU4Ra28GT/3JGntnhhxFmz1xe/h5YNJTwZ+0TX yxKZdAz3brm/mt6uvbY4PpGERyA+X/Moz4ToXCEL2jVfSXbOuajRtCV8Cp3X7bCd Ed2imuXZQPpUXNVdF73RJ7YB6vEhQRIdlKgEXzPPpuHFH1HprvSLoJyrDD1T8bfx TVrrmvtWKtXq0DYSD7wGw23WZJJeUIgyKiZNTlIxvb0c7r8+aZ+toY07sZlBkTCA cjWNRnHDNkdYH2ZoNPQlzYzk5rSYGqhoOvF85pNCY4v4fofyMEnyAY7MEZ/Z991X Ko2ShKSzEtKSMcx2B2wPg+hFcACP8HbKxSbW3SzoCSKCOGEAPLQlJ5eHXwLOAO3Q IZIK7xZywNw=8RZh -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2016-4448) It was discovered that libxml2 incorrectly handled certain malformed documents. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-09-20-5 watchOS 3 The watchOS 3 advisory has been updated to include additional entries as noted below. Audio Available for: All Apple Watch models Impact: A remote attacker may be able to execute arbitrary code Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4702: YoungJin Yoon, MinSik Shin, HoJae Han, Sunghyun Park, and Taekyoung Kwon of Information Security Lab, Yonsei University Entry added September 20, 2016 CFNetwork Available for: All Apple Watch models Impact: Processing maliciously crafted web content may compromise user information Description: An input validation issue existed in the parsing of the set-cookie header. This issue was addressed through improved validation checking. CVE-2016-4708: Dawid Czagan of Silesia Security Lab Entry added September 20, 2016 CoreCrypto Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code Description: An out-of-bounds write issue was addressed by removing the vulnerable code. CVE-2016-4712: Gergo Koteles Entry added September 20, 2016 FontParser Available for: All Apple Watch models Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking. CVE-2016-4718: Apple Entry added September 20, 2016 GeoServices Available for: All Apple Watch models Impact: An application may be able to read sensitive location information Description: A permissions issue existed in PlaceData. This issue was addressed through improved permission validation. CVE-2016-4719: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt) IOAcceleratorFamily Available for: All Apple Watch models Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: A memory corruption issue was addressed through improved input validation. CVE-2016-4725: Rodger Combs of Plex, Inc. Entry added September 20, 2016 IOAcceleratorFamily Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4726: An anonymous researcher Entry added September 20, 2016 Kernel Available for: All Apple Watch models Impact: A remote attacker may be able to cause a denial of service Description: A lock handling issue was addressed through improved lock handling. CVE-2016-4772: Marc Heuse of mh-sec Entry added September 20, 2016 Kernel Available for: All Apple Watch models Impact: An application may be able to determine kernel memory layout Description: Multiple out-of-bounds read issues existed that led to the disclosure of kernel memory. These were addressed through improved input validation. CVE-2016-4773: Brandon Azad CVE-2016-4774: Brandon Azad CVE-2016-4776: Brandon Azad Entry added September 20, 2016 Kernel Available for: All Apple Watch models Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4775: Brandon Azad Entry added September 20, 2016 Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: An untrusted pointer dereference was addressed by removing the affected code. CVE-2016-4777: Lufeng Li of Qihoo 360 Vulcan Team Entry added September 20, 2016 Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4778: CESG Entry added September 20, 2016 libxml2 Available for: All Apple Watch models Impact: Multiple issues in libxml2, the most significant of which may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4658: Nick Wellnhofer CVE-2016-5131: Nick Wellnhofer Entry added September 20, 2016 libxslt Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4738: Nick Wellnhofer Entry added September 20, 2016 Security Available for: All Apple Watch models Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in signed disk images. This issue was addressed through improved size validation. CVE-2016-4753: Mark Mentovai of Google Inc. Entry added September 20, 2016 WebKit Available for: All Apple Watch models Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2016-4737: Apple Entry added September 20, 2016 Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJX4YPQAAoJEIOj74w0bLRG8S0QAIkepFBcosbmZLpY04hlt+Ah yHXnqKyghV5Ribkl64KUQRkyPHDOGaEaErYEiscMtUqbFP/rnSM8ScFF65Oxxg/P 3NCGpKkedA0J4cMtb58x4nvWJe3GW8aV8iP4H7t65jCprdIAxZuniLjhGMtM0r7G a/A6cmpqhwL055RMr1c7ksC1oCk43BP5rZOlndqE9Ns6lw1F5RNmATbZgjHdPHkC xuml7fEdhRbt/lswdDMq7epIZFqDX7jlZig349oesZhsUVczQnRZtsdUQ695OZcd XSZisclix5b0t4Ett5HiarbYLYbalnz5ftU511Va9pf5VOGaZcl942cmns8CRbQy GT+qCk9TCMhtf6nqBTrX8MwSP481fa1OssLHE1rYGibBFpr0xqqXw70zzpl77w9I OT31mBtdrPor7luR7haXOMuwaD7Fbmj6sd3ph0p6wQQG0GZ/zsLRJtBJfFU2Qx1X fesFDPTyNrby4nMHaF6MGY04hME2zHApq0KHOtGfg3WaaIJWGbWY+xPAUW5kDLIf Q6u+8BVjCT1qvfK3oi93wA5FOqfqlud4LuMGdTehJL1PBTh93JnabQwZDuNjufg0 4p4j7jFIenYxdYgjbbCKrXu6PYTUB7yqMRDYAQN7hk4bKabwHacyqKmQbH5MCYXt yHVD9Vuo3lqcs8fMnUow =yYuL -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201610-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: October 29, 2016 Bugs: #589278, #590420, #592630, #593708, #595614, #597016 ID: 201610-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Background ========== Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-54.0.2840.59" References ========== [ 1 ] CVE-2016-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5127 [ 2 ] CVE-2016-5128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5128 [ 3 ] CVE-2016-5129 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5129 [ 4 ] CVE-2016-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5130 [ 5 ] CVE-2016-5131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5131 [ 6 ] CVE-2016-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5132 [ 7 ] CVE-2016-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5133 [ 8 ] CVE-2016-5134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5134 [ 9 ] CVE-2016-5135 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5135 [ 10 ] CVE-2016-5136 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5136 [ 11 ] CVE-2016-5137 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5137 [ 12 ] CVE-2016-5138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5138 [ 13 ] CVE-2016-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5139 [ 14 ] CVE-2016-5140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5140 [ 15 ] CVE-2016-5141 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5141 [ 16 ] CVE-2016-5142 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5142 [ 17 ] CVE-2016-5143 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5143 [ 18 ] CVE-2016-5144 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5144 [ 19 ] CVE-2016-5145 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5145 [ 20 ] CVE-2016-5146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5146 [ 21 ] CVE-2016-5147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5147 [ 22 ] CVE-2016-5148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5148 [ 23 ] CVE-2016-5149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5149 [ 24 ] CVE-2016-5150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5150 [ 25 ] CVE-2016-5151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5151 [ 26 ] CVE-2016-5152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5152 [ 27 ] CVE-2016-5153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5153 [ 28 ] CVE-2016-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5154 [ 29 ] CVE-2016-5155 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5155 [ 30 ] CVE-2016-5156 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5156 [ 31 ] CVE-2016-5157 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5157 [ 32 ] CVE-2016-5158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5158 [ 33 ] CVE-2016-5159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5159 [ 34 ] CVE-2016-5160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5160 [ 35 ] CVE-2016-5161 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5161 [ 36 ] CVE-2016-5162 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5162 [ 37 ] CVE-2016-5163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5163 [ 38 ] CVE-2016-5164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5164 [ 39 ] CVE-2016-5165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5165 [ 40 ] CVE-2016-5166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5166 [ 41 ] CVE-2016-5167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5167 [ 42 ] CVE-2016-5170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5170 [ 43 ] CVE-2016-5171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5171 [ 44 ] CVE-2016-5172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5172 [ 45 ] CVE-2016-5173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5173 [ 46 ] CVE-2016-5174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5174 [ 47 ] CVE-2016-5175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5175 [ 48 ] CVE-2016-5177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5177 [ 49 ] CVE-2016-5178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5178 [ 50 ] CVE-2016-5181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5181 [ 51 ] CVE-2016-5182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5182 [ 52 ] CVE-2016-5183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5183 [ 53 ] CVE-2016-5184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5184 [ 54 ] CVE-2016-5185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5185 [ 55 ] CVE-2016-5186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5186 [ 56 ] CVE-2016-5187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5187 [ 57 ] CVE-2016-5188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5188 [ 58 ] CVE-2016-5189 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5189 [ 59 ] CVE-2016-5190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5190 [ 60 ] CVE-2016-5191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5191 [ 61 ] CVE-2016-5192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5192 [ 62 ] CVE-2016-5193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5193 [ 63 ] CVE-2016-5194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5194 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201610-09 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 1.8

sources: NVD: CVE-2016-5131 // VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 138795 // PACKETSTORM: 139376 // PACKETSTORM: 140266

AFFECTED PRODUCTS

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:lteversion:2.9.4

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:susemodel:linux enterprisescope:eqversion:12.0

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:3.0

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:10.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.12

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:10.0

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:42.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:52.0.2743.82

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:applemodel:tvscope:eqversion:9.2.2

Trust: 0.6

vendor:applemodel:watch osscope:eqversion:2.2.2

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:9.3.5

Trust: 0.6

sources: CNNVD: CNNVD-201607-919 // NVD: CVE-2016-5131

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-5131
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201607-919
value: HIGH

Trust: 0.6

VULHUB: VHN-93950
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-5131
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-5131
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-93950
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-5131
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // CNNVD: CNNVD-201607-919 // NVD: CVE-2016-5131

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

sources: VULHUB: VHN-93950 // NVD: CVE-2016-5131

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 138182 // PACKETSTORM: 139376 // PACKETSTORM: 140266 // CNNVD: CNNVD-201607-919

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201607-919

PATCH

title:Google Chrome libxml2 Remediation measures for reusing vulnerabilities after releaseurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=63279

Trust: 0.6

title:Red Hat: Moderate: libxml2 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20201190 - Security Advisory

Trust: 0.1

title:IBM: Security Bulletin: IBM App Connect Enterprise Certified Container may be vulnerable to arbitrary code execution and denial of service due to CVE-2017-15412 and CVE-2016-5131url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=eafa647f9fc3bb9f8229531c9119b24a

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: CVE-2016-4658url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=875827e87aed79825801cf0c7dbfb4a3

Trust: 0.1

title:Ubuntu Security Notice: libxml2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3235-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: libxml2: CVE-2016-5131url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=9f32dd31cb36cd4b73309a01754e5056

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2016-5131

Trust: 0.1

title:Arch Linux Advisories: [ASA-201611-2] libxml2: arbitrary code executionurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-201611-2

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1466url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1466

Trust: 0.1

title:Amazon Linux AMI: ALAS-2020-1415url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1415

Trust: 0.1

title:Ubuntu Security Notice: oxide-qt vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3041-1

Trust: 0.1

title:Debian Security Advisories: DSA-3637-1 chromium-browser -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=eefbda06bd525a710a6c341dda9680c9

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20182486 - Security Advisory

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—June 2017url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=f9fbdf3aea1fd17035e18f77d6530ab1

Trust: 0.1

title:Android Security Bulletins: Android Security Bulletin—May 2017url:https://vulmon.com/vendoradvisory?qidtp=android_security_bulletins&qid=473019536b98d5c3b462c97d8bdb8384

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:aws_inspector_parserurl:https://github.com/0xfabiof/aws_inspector_parser

Trust: 0.1

title:afl-cveurl:https://github.com/mrash/afl-cve

Trust: 0.1

title: - url:https://github.com/vincent-deng/veracode-container-security-finding-parser

Trust: 0.1

title:Threatposturl:https://threatpost.com/google-fixes-sandbox-escape-in-chrome-again/119428/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/google/google-chrome-52-0-2743-82-released-with-48-security-fixes/

Trust: 0.1

sources: VULMON: CVE-2016-5131 // CNNVD: CNNVD-201607-919

EXTERNAL IDS

db:NVDid:CVE-2016-5131

Trust: 2.6

db:SECTRACKid:1038623

Trust: 1.8

db:SECTRACKid:1036428

Trust: 1.8

db:BIDid:92053

Trust: 1.8

db:CNNVDid:CNNVD-201607-919

Trust: 0.7

db:AUSCERTid:ESB-2020.2200

Trust: 0.6

db:AUSCERTid:ESB-2023.3732

Trust: 0.6

db:VULHUBid:VHN-93950

Trust: 0.1

db:VULMONid:CVE-2016-5131

Trust: 0.1

db:PACKETSTORMid:138122

Trust: 0.1

db:PACKETSTORMid:140533

Trust: 0.1

db:PACKETSTORMid:138182

Trust: 0.1

db:PACKETSTORMid:157021

Trust: 0.1

db:PACKETSTORMid:141667

Trust: 0.1

db:PACKETSTORMid:138795

Trust: 0.1

db:PACKETSTORMid:139376

Trust: 0.1

db:PACKETSTORMid:140266

Trust: 0.1

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 138795 // PACKETSTORM: 139376 // PACKETSTORM: 140266 // CNNVD: CNNVD-201607-919 // NVD: CVE-2016-5131

REFERENCES

url:https://security.gentoo.org/glsa/201610-09

Trust: 1.9

url:https://security.gentoo.org/glsa/201701-37

Trust: 1.9

url:http://www.ubuntu.com/usn/usn-3041-1

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00006.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00008.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00010.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00011.html

Trust: 1.8

url:http://www.securityfocus.com/bid/92053

Trust: 1.8

url:http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=1358641

Trust: 1.8

url:https://codereview.chromium.org/2127493002

Trust: 1.8

url:https://crbug.com/623378

Trust: 1.8

url:https://source.android.com/security/bulletin/2017-05-01

Trust: 1.8

url:https://support.apple.com/ht207141

Trust: 1.8

url:https://support.apple.com/ht207142

Trust: 1.8

url:https://support.apple.com/ht207143

Trust: 1.8

url:https://support.apple.com/ht207170

Trust: 1.8

url:http://www.debian.org/security/2016/dsa-3637

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2016-1485.html

Trust: 1.8

url:http://www.securitytracker.com/id/1036428

Trust: 1.8

url:http://www.securitytracker.com/id/1038623

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-5131

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2023.3732

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-security-is-affected-by-multiple-vulnerabilities/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2200/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-4658

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-5130

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5127

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5133

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5137

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5132

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5129

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5134

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5128

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5135

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2020:1190

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1706

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1705

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1710

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-1711

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-5136

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5131

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8035

Trust: 0.2

url:https://security.gentoo.org/

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/3235-1/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=47177

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1708

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1704

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1707

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1709

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3705

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-3627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1819

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7499

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7499

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1839

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8242

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2073

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5312

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7498

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7941

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-3627

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-5312

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7498

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7500

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7941

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1819

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7497

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8242

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7497

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/oxide-qt/1.16.5-0ubuntu0.14.04.1

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-15412

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14404

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-15412

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.8_release_notes/index

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14404

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14567

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18258

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-5131

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8035

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.17

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.1+dfsg1-3ubuntu4.9

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-3235-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.3+dfsg1-1ubuntu0.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4448

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.9.4+dfsg1-2ubuntu0.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4708

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4773

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4775

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4726

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4702

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4777

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4776

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4712

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4774

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4725

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4738

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4753

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-4718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5153

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5150

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5139

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5186

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5172

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5190

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5189

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5150

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5136

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5165

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5191

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5152

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5162

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5132

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5158

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5141

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5163

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5155

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5152

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5147

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5193

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5164

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-5137

Trust: 0.1

sources: VULHUB: VHN-93950 // VULMON: CVE-2016-5131 // PACKETSTORM: 138122 // PACKETSTORM: 140533 // PACKETSTORM: 138182 // PACKETSTORM: 157021 // PACKETSTORM: 141667 // PACKETSTORM: 138795 // PACKETSTORM: 139376 // PACKETSTORM: 140266 // CNNVD: CNNVD-201607-919 // NVD: CVE-2016-5131

CREDITS

Debian

Trust: 0.2

sources: PACKETSTORM: 138122 // PACKETSTORM: 140266

SOURCES

db:VULHUBid:VHN-93950
db:VULMONid:CVE-2016-5131
db:PACKETSTORMid:138122
db:PACKETSTORMid:140533
db:PACKETSTORMid:138182
db:PACKETSTORMid:157021
db:PACKETSTORMid:141667
db:PACKETSTORMid:138795
db:PACKETSTORMid:139376
db:PACKETSTORMid:140266
db:CNNVDid:CNNVD-201607-919
db:NVDid:CVE-2016-5131

LAST UPDATE DATE

2025-03-26T22:33:47.406000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93950date:2019-03-26T00:00:00
db:VULMONid:CVE-2016-5131date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-201607-919date:2023-06-30T00:00:00
db:NVDid:CVE-2016-5131date:2024-11-21T02:53:40.980

SOURCES RELEASE DATE

db:VULHUBid:VHN-93950date:2016-07-23T00:00:00
db:VULMONid:CVE-2016-5131date:2016-07-23T00:00:00
db:PACKETSTORMid:138122date:2016-08-01T11:11:00
db:PACKETSTORMid:140533date:2017-01-17T02:26:10
db:PACKETSTORMid:138182date:2016-08-05T22:47:06
db:PACKETSTORMid:157021date:2020-04-01T15:13:56
db:PACKETSTORMid:141667date:2017-03-16T23:37:18
db:PACKETSTORMid:138795date:2016-09-20T17:02:22
db:PACKETSTORMid:139376date:2016-10-29T13:13:00
db:PACKETSTORMid:140266date:2016-12-24T17:05:07
db:CNNVDid:CNNVD-201607-919date:2016-07-26T00:00:00
db:NVDid:CVE-2016-5131date:2016-07-23T19:59:13.767