An out-of-bounds memory access flaw was found in the way libxml2 parsed documents with an unclosed comment. An attacker could provide specially crafted input that, when parsed by an application using libxml2, could cause that application to disclose arbitrary parts of that application's memory, potentially revealing sensitive information. Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=746048 References: https://hackerone.com/reports/57125 https://github.com/Shopify/nokogiri/compare/1b1fcad8bd64ab70256666c38d2c998e86ade8c0...master
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1276689]
looks to be a duplicate of 1262849 which contains the same commit link.
(In reply to Agostino Sarubbo from comment #2) > looks to be a duplicate of 1262849 which contains the same commit link. Ha, you're right. Thanks for catching this! *** This bug has been marked as a duplicate of bug 1262849 ***