An out-of-bounds read vulnerability was found in libxml2 with crafted xml input. Report can be found here: https://bugzilla.gnome.org/show_bug.cgi?id=744980#c1 Upstream patches: https://git.gnome.org/browse/libxml2/commit/?id=a7dfab7411cbf545f359dd3157e5df1eb0e7ce31 https://git.gnome.org/browse/libxml2/commit/?id=9b8512337d14c8ddf662fcb98b0135f225a1c489 CVE request: http://seclists.org/oss-sec/2015/q4/127
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1274224]
Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1274225] Affects: epel-7 [bug 1274226]
*** Bug 1281955 has been marked as a duplicate of this bug. ***
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2015:2549 https://rhn.redhat.com/errata/RHSA-2015-2549.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:2550 https://rhn.redhat.com/errata/RHSA-2015-2550.html
This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html