Source: libxml2
Version: 2.9.2+zdfsg1-4
Severity: normal
Tags: security upstream
Forwarded: https://bugzilla.gnome.org/show_bug.cgi?id=756372

Hi,

>From https://bugzilla.redhat.com/show_bug.cgi?id=1281950:
> Stack-based buffer overread vulnerability with HTML parser in push
> mode in xmlSAX2TextNode causing segmentation fault when compiled
> with ASAN.

Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=756372 but
there are several interations of the patch so far.

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to