CVE-2016-0718: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
My apologies, I looked for an issue logged for this by CVE ID, didn't realize it was already fixed.
Is there an expected release date for an update with the fix in it? I've been looking through the updates trying to figure out exactly which one(s) were used to fix the issue and I'm having trouble figuring it out. It seems multiple checkins were done. I also see some other interesting changes that seem worthy of pushing out in a release.
Thanks
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Hello David!
We made those very patches and they are in Git by now, as well. Please re-open if this is a misunderstanding.
My apologies, I looked for an issue logged for this by CVE ID, didn't realize it was already fixed.
Is there an expected release date for an update with the fix in it? I've been looking through the updates trying to figure out exactly which one(s) were used to fix the issue and I'm having trouble figuring it out. It seems multiple checkins were done. I also see some other interesting changes that seem worthy of pushing out in a release.
Thanks
For a next release maybe two weeks or so. I see worth in a new release, too.
On the related commits, it's a squash of these eight trivially rebased against tag R_2_1_1: