Source: libxml2 Version: 2.9.2+zdfsg1-4 Severity: normal Tags: security upstream Forwarded: https://bugzilla.gnome.org/show_bug.cgi?id=756372
Hi, >From https://bugzilla.redhat.com/show_bug.cgi?id=1281950: > Stack-based buffer overread vulnerability with HTML parser in push > mode in xmlSAX2TextNode causing segmentation fault when compiled > with ASAN. Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=756372 but there are several interations of the patch so far. Regards, Salvatore _______________________________________________ Secure-testing-team mailing list Secure-testing-team@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team