https://bugzilla.redhat.com/show_bug.cgi?id=1281950

            Bug ID: 1281950
           Summary: libxml2: Buffer overread with HTML parser in push mode
                    in xmlSAX2TextNode
           Product: Security Response
         Component: vulnerability
          Keywords: Security
          Severity: low
          Priority: low
          Assignee: security-response-t...@redhat.com
          Reporter: ama...@redhat.com
                CC: athma...@gmail.com, c.davi...@gmail.com,
                    erik-fed...@vanpienbroek.nl,
                    fedora-mi...@lists.fedoraproject.org,
                    kti...@redhat.com, lfar...@lfarkas.org,
                    ohudl...@redhat.com, rjo...@redhat.com,
                    veill...@redhat.com



Stack-based buffer overread vulnerability with HTML parser in push mode in
xmlSAX2TextNode causing segmentation fault when compiled with ASAN.

Upstream bug (containing reproducer):

https://bugzilla.gnome.org/show_bug.cgi?id=756372

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=S97GEQo7jh&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to