https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Doc Text *updated* by Timothy Walsh ---
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain
crafted XML input. A remote attacker could provide a specially crafted XML file
that, when opened in
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
--- Doc Text *updated* by Timothy Walsh ---
It was found that libxml2 2.9.2 does not properly stop parsing invalid input,
which allows context-dependent attackers to cause a denial of service
(out-of-bounds read and