Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 18 Nov 2015 00:00:01 +0900
From: GAURAV GUPTA <ya1gaurav@...il.com>
To: oss-security@...ts.openwall.com, cve-assign@...re.org
Subject: Buffer overflow in libxml2

Hello,
Please assign CVE for below vulnerability:

Description : Buffer overlflow in libxml2 with crafted xml input generated
using Fuzzer - American fuzzy loop when compiled with ASAN.

Reported discussion : https://bugzilla.gnome.org/show_bug.cgi?id=756263

Upstream Fixes :
https://git.gnome.org/browse/libxml2/commit/?id=ab2b9a93ff19cedde7befbf2fcc48c6e352b6cbe


-- 
Regards,
Gaurav Gupta

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.