https://bugzilla.redhat.com/show_bug.cgi?id=1274222


--- Doc Text *updated* by Timothy Walsh <twa...@redhat.com> ---
It was found that libxml2 2.9.2 does not properly stop parsing invalid input, 
which allows context-dependent attackers to cause a denial of service 
(out-of-bounds read and libxml2 crash) via crafted XML data to the (1) 
xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as 
demonstrated by non-terminated entities.


-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
http://lists.fedoraproject.org/admin/lists/mingw@lists.fedoraproject.org

Reply via email to