Hide Forgot
A heap-based buffer overflow was found in xmlGROW allowing the attacker to read the memory out of bounds. Upstream bug: https://bugzilla.gnome.org/show_bug.cgi?id=756479
Created attachment 1093836 [details] Upstream patch
Acknowledgments: Name: the GNOME project Upstream: Kostya Serebryany
Upstream commits: https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:2549 https://rhn.redhat.com/errata/RHSA-2015-2549.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2550 https://rhn.redhat.com/errata/RHSA-2015-2550.html
This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html