Security researcher firehack reported a buffer overflow when parsing HTML5 fragments in a foreign context such as under an <svg> node. This results in a potentially exploitable crash when inserting an HTML fragment into an existing document. External Reference: https://www.mozilla.org/security/announce/2016/mfsa2016-50.html Acknowledgements: Name: the Mozilla project Upstream: firehack
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 6 Via RHSA-2016:1217 https://access.redhat.com/errata/RHSA-2016:1217