https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Bug ID: 1281936 Summary: libxml2: Buffer overread with XML parser in xmlNextChar Product: Security Response Component: vulnerability Keywords: Security Severity: low Priority: low Assignee: security-response-t...@redhat.com Reporter: ama...@redhat.com CC: athma...@gmail.com, c.davi...@gmail.com, erik-fed...@vanpienbroek.nl, fedora-mi...@lists.fedoraproject.org, kti...@redhat.com, lfar...@lfarkas.org, ohudl...@redhat.com, rjo...@redhat.com, veill...@redhat.com A buffer overread in xmlNextChar was found, causing segmentation fault when compiled with ASAN. Upstream bug (contains reproducer): https://bugzilla.gnome.org/show_bug.cgi?id=756263 Upstream patch: https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=AuaeY9x6SN&a=cc_unsubscribe _______________________________________________ mingw mailing list mingw@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/mingw