Out-of-bounds memory access vulnerability when parsing unclosed HTMl comment was found in libxml2. By entering a unclosed html comment such as <!-- the libxml2 parser didn't stop parsing at the end of the buffer, causing random memory to be included in the parsed comment. CVE request: http://seclists.org/oss-sec/2015/q3/540 Upstream was notified, but patch is not released yet. However, a patch for nokogiri, which uses embedded libxml2, was proposed: https://github.com/Shopify/nokogiri/compare/1b1fcad8bd64ab70256666c38d2c998e86ade8c0...master
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1262851]
Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1262853] Affects: epel-7 [bug 1262854]
*** Bug 1276688 has been marked as a duplicate of this bug. ***
Upstream patch: https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
*** This bug has been marked as a duplicate of bug 1213957 ***
I'm delighted to read the extremely helpful knowledge you offer. I really appreciate you sharing. https://retrobowlmod.com