Tags: security upstream patch fixed-upstream
the following vulnerability was published for libxml2.
| Use-after-free vulnerability in libxml2 through 2.9.4, as used in
| Google Chrome before 52.0.2743.82, allows remote attackers to cause a
| denial of service or possibly have unspecified other impact via
| vectors related to the XPointer range-to function.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
 https://bugzilla.gnome.org/show_bug.cgi?id=768428 (not public)
Please adjust the affected versions in the BTS as needed.
Secure-testing-team mailing list