Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 18 Nov 2015 00:00:01 +0900
From: GAURAV GUPTA <ya1gaurav@...il.com>
To: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Buffer overflow in libxml2

Hello,
Please assign CVE for below vulnerability:

Description : Buffer overlflow in libxml2 with crafted xml input generated
using Fuzzer - American fuzzy loop when compiled with ASAN.

Reported discussion : https://bugzilla.gnome.org/show_bug.cgi?id=756263

Upstream Fixes :
https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe


-- 
Regards,
Gaurav Gupta

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ