High severityNVD Advisory· Published Dec 15, 2015· Updated May 6, 2026
CVE-2015-5312
CVE-2015-5312
Description
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
nokogiriRubyGems | >= 1.6.0, < 1.6.7.1 | 1.6.7.1 |
Affected products
17- cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- lists.apple.com/archives/security-announce/2016/Mar/msg00002.htmlnvdThird Party Advisory
- marc.infonvdThird Party AdvisoryWEB
- rhn.redhat.com/errata/RHSA-2015-2549.htmlnvdThird Party AdvisoryWEB
- rhn.redhat.com/errata/RHSA-2015-2550.htmlnvdThird Party AdvisoryWEB
- www.debian.org/security/2015/dsa-3430nvdThird Party AdvisoryWEB
- www.ubuntu.com/usn/USN-2834-1nvdThird Party AdvisoryWEB
- xmlsoft.org/news.htmlnvdVendor AdvisoryWEB
- github.com/advisories/GHSA-xjqg-9jvg-fgx2ghsaADVISORY
- h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplaynvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2015-5312ghsaADVISORY
- support.apple.com/HT206166nvdVendor AdvisoryWEB
- support.apple.com/HT206167nvdVendor AdvisoryWEB
- support.apple.com/HT206168nvdVendor AdvisoryWEB
- support.apple.com/HT206169nvdVendor AdvisoryWEB
- lists.apple.com/archives/security-announce/2016/Mar/msg00000.htmlnvdWEB
- lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlnvdMailing List
- lists.opensuse.org/opensuse-updates/2015-12/msg00120.htmlnvdWEB
- lists.opensuse.org/opensuse-updates/2016-01/msg00031.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlnvdWEB
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvdWEB
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingWEB
- git.gnome.org/browse/libxml2/commit/nvdWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-5312.ymlghsaWEB
- groups.google.com/forum/ghsaWEB
- security.gentoo.org/glsa/201701-37nvdWEB
- lists.apple.com/archives/security-announce/2016/Mar/msg00001.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-1089.htmlnvd
- www.securityfocus.com/bid/79536nvd
- www.securitytracker.com/id/1034243nvd
News mentions
0No linked articles in our index yet.