[Bug 1281936] New: libxml2: Buffer overread with XML parser in xmlNextChar

bugzilla at redhat.com bugzilla at redhat.com
Fri Nov 13 20:59:28 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1281936

            Bug ID: 1281936
           Summary: libxml2: Buffer overread with XML parser in
                    xmlNextChar
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-team at redhat.com
          Reporter: amaris at redhat.com
                CC: athmanem at gmail.com, c.david86 at gmail.com,
                    erik-fedora at vanpienbroek.nl,
                    fedora-mingw at lists.fedoraproject.org,
                    ktietz at redhat.com, lfarkas at lfarkas.org,
                    ohudlick at redhat.com, rjones at redhat.com,
                    veillard at redhat.com



A buffer overread in xmlNextChar was found, causing segmentation fault when
compiled with ASAN.

Upstream bug (contains reproducer):

https://bugzilla.gnome.org/show_bug.cgi?id=756263

Upstream patch:

https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=AuaeY9x6SN&a=cc_unsubscribe


More information about the mingw mailing list