https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #16 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Comment #13 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
--- Comment #13 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1213957
--- Comment #17 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
--- Comment #13 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Comment #14 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
--- Comment #12 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You are on the CC list for the bu
https://bugzilla.redhat.com/show_bug.cgi?id=1335683
Richard W.M. Jones changed:
What|Removed |Added
Attachment|application/mbox|text/plain
#1156933 mime type|
https://bugzilla.redhat.com/show_bug.cgi?id=1335683
Richard W.M. Jones changed:
What|Removed |Added
Assignee|rjo...@redhat.com |klem...@redhat.com
--
You are r
https://bugzilla.redhat.com/show_bug.cgi?id=1306047
--- Comment #11 from Kalev Lember ---
Can you send this upstream to
https://bugzilla.gnome.org/enter_bug.cgi?product=glib , please? And maybe ask
nacho to review it on IRC afterwards?
Thanks!
--
You are receiving this mail because:
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1335683
Kalev Lember changed:
What|Removed |Added
CC||klem...@redhat.com
--- Comment #2 from
https://bugzilla.redhat.com/show_bug.cgi?id=1335683
--- Comment #1 from Sandro Mani ---
Created attachment 1156934
--> https://bugzilla.redhat.com/attachment.cgi?id=1156934&action=edit
Patch: fix FTBFS
--
You are receiving this mail because:
You are on the CC list for the bug.
_
https://bugzilla.redhat.com/show_bug.cgi?id=1335683
Bug ID: 1335683
Summary: [Patch] Fix static libraries
Product: Fedora
Version: rawhide
Component: mingw-cairo
Assignee: rjo...@redhat.com
Reporter: manisan...@gmail.com
https://bugzilla.redhat.com/show_bug.cgi?id=1306047
Sandro Mani changed:
What|Removed |Added
Version|24 |rawhide
--
You are receiving this mail
https://bugzilla.redhat.com/show_bug.cgi?id=1306047
Sandro Mani changed:
What|Removed |Added
Attachment|0 |1
#1122789 is|
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
--- Comment #6 from errata-xmlrpc ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html
--
You are receiving this mail because:
You ar
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
--- Comment #16 from errata-xmlrpc ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html
--
You are receiving this mail because:
You a
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
--- Comment #6 from errata-xmlrpc ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html
--
You are receiving this mail because:
You ar
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would cause that application
https://bugzilla.redhat.com/show_bug.cgi?id=1332833
Bug ID: 1332833
Summary: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow
before detecting invalid XML file [epel-7]
Product: Fedora EPEL
Version: epel7
Component: ming
https://bugzilla.redhat.com/show_bug.cgi?id=1332832
--- Comment #1 from Andrej Nemec ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure that all associat
https://bugzilla.redhat.com/show_bug.cgi?id=1332833
--- Comment #1 from Andrej Nemec ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure that all associat
https://bugzilla.redhat.com/show_bug.cgi?id=1332832
Bug ID: 1332832
Summary: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow
before detecting invalid XML file [fedora-all]
Product: Fedora
Version: 23
Component: mingw-li
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
Andrej Nemec changed:
What|Removed |Added
Blocks||1332827
--
You are receiving this mai
https://bugzilla.redhat.com/show_bug.cgi?id=1332824
Andrej Nemec changed:
What|Removed |Added
Summary|CVE-2016-4483 |CVE-2016-4483
|mingw-l
https://bugzilla.redhat.com/show_bug.cgi?id=1332825
Andrej Nemec changed:
What|Removed |Added
Summary|CVE-2016-4483 |CVE-2016-4483
|mingw-l
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
Andrej Nemec changed:
What|Removed |Added
Summary|CVE-2016-4483 libxml2: |CVE-2016-4483 libxml2:
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
--- Comment #2 from Andrej Nemec ---
Created mingw-libxml2 tracking bugs for this issue:
Affects: fedora-all [bug 1332824]
Affects: epel-7 [bug 1332825]
--
You are receiving this mail because:
You are on the CC list for the bug.
__
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
Andrej Nemec changed:
What|Removed |Added
Depends On||1332823
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1332825
--- Comment #1 from Andrej Nemec ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure that all associat
https://bugzilla.redhat.com/show_bug.cgi?id=1332824
--- Comment #1 from Andrej Nemec ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure that all associat
https://bugzilla.redhat.com/show_bug.cgi?id=1332825
Bug ID: 1332825
Summary: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds
read parsing a [epel-7]
Product: Fedora EPEL
Version: epel7
Component: mingw-libxml2
https://bugzilla.redhat.com/show_bug.cgi?id=1332824
Bug ID: 1332824
Summary: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds
read parsing a [fedora-all]
Product: Fedora
Version: 23
Component: mingw-libxml2
Keyw
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
Andrej Nemec changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2016 |impact=moderate,public=2016
https://bugzilla.redhat.com/show_bug.cgi?id=1332820
Bug ID: 1332820
Summary: CVE-2016-4483 libxml2: out-of-bounds read parsing a
Product: Security Response
Component: vulnerability
Keywords: Security
Severity: medium
Priority
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
Tomas Hoger changed:
What|Removed |Added
Depends On||1330508
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Tomas Hoger changed:
What|Removed |Added
Depends On||1330508
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger changed:
What|Removed |Added
Depends On||1330508
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Tomas Hoger changed:
What|Removed |Added
Depends On||1330494
--
You are receiving this mail
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Tomas Hoger changed:
What|Removed |Added
Depends On||1330490
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
Tomas Hoger changed:
What|Removed |Added
Depends On||1330455
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1287614
Tomas Hoger changed:
What|Removed |Added
Depends On||1330455
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1311503
Tomas Hoger changed:
What|Removed |Added
Priority|medium |high
Whiteboard|impact=moderate,p
https://bugzilla.redhat.com/show_bug.cgi?id=1287614
Tomas Hoger changed:
What|Removed |Added
Priority|medium |high
Whiteboard|impact=moderate,p
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
Martin Prpic changed:
What|Removed |Added
Priority|high|low
Severity|high
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger changed:
What|Removed |Added
Priority|low |medium
Status|CLOSED
https://bugzilla.redhat.com/show_bug.cgi?id=1304636
--- Comment #4 from Cedric Buissart ---
I believe that this is actually a duplicate of CVE-2016-2073
--
You are receiving this mail because:
You are on the CC list for the bug.
___
mingw mailing li
https://bugzilla.redhat.com/show_bug.cgi?id=1301928
Cedric Buissart changed:
What|Removed |Added
CC||cbuis...@redhat.com
--- Comment #3
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Doc Text *updated* by Timothy Walsh ---
A heap-based buffer over-read flaw was found libxml2. The xmlNextChar function
in libxml2 does not properly check the state, which allows context-dependent
attackers to cause an application crash a
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
--- Doc Text *updated* by Timothy Walsh ---
A vulnerability in libxml2 was found that caused a denial of service when
parsing specially crafted XML document with XZ support is enabled.
--
You are receiving this mail because:
You are on the
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Doc Text *updated* by Timothy Walsh ---
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain
crafted XML input. A remote attacker could provide a specially crafted XML file
that, when opened in an application link
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
--- Doc Text *updated* by Timothy Walsh ---
It was found that libxml2 2.9.2 does not properly stop parsing invalid input,
which allows context-dependent attackers to cause a denial of service
(out-of-bounds read and libxml2 crash) via crafted
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Doc Text *updated* by Timothy Walsh ---
A stack-based buffer over-read flaw was found in libxml2 in the xmlSAX2TextNode
function in SAX2.c that allows context-dependent attackers to cause a denial of
service or obtain sensitive informatio
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Doc Text *updated* by Timothy Walsh ---
A buffer over-read flaw was found in libxml2 in xmlNextChar causing
segmentation fault when compiled with ASAN.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
--- Doc Text *updated* by Timothy Walsh ---
An out-of-bounds head read flaw was found in libxml2 in the xmlParseXMLDecl
function in parser.c that allows context-dependent attackers to obtain
sensitive information via an unterminated encoding
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Doc Text *updated* by Timothy Walsh ---
A stack-based buffer over-read vulnerability was found in libxml2 in the
xmlSAX2TextNode function in SAX2.c that allows context-dependent attackers to
cause a denial of service or obtain sensitive i
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Doc Text *updated* by Timothy Walsh ---
A buffer over-read vulnerability was found in libxml2 in xmlNextChar causing
segmentation fault when compiled with ASAN.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
--- Doc Text *updated* by Timothy Walsh ---
An out-of-bounds head read vulnerability was found in libxml2 in the
xmlParseXMLDecl function in parser.c that allows context-dependent attackers to
obtain sensitive information via an unterminated
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
--- Doc Text *updated* by Timothy Walsh ---
A vulnerability in libxml2 was found that caused a Dos when parsing specially
crafted XML document with XZ support is enabled.
--
You are receiving this mail because:
You are on the CC list for th
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Doc Text *updated* by Martin Prpic ---
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain
crafted XML input. A remote attacker could provide a specially crafted XML file
that, when opened in an application linke
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Doc Text *updated* by Timothy Walsh ---
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain
crafted XML input. A remote attacker could provide a specially-crafted XML file
that, when opened in an application link
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
shiwang changed:
What|Removed |Added
Priority|low |high
Severity|low
https://bugzilla.redhat.com/show_bug.cgi?id=1287614
Tomas Hoger changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015
https://bugzilla.redhat.com/show_bug.cgi?id=1324743
Bug ID: 1324743
Summary: mingw64-configure and mingw32-configure ignore
--prefix option
Product: Fedora
Version: 23
Component: mingw32-filesystem
Assignee: extras
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger changed:
What|Removed |Added
Summary|CVE-2015-2328 pcre: |CVE-2015-2328 pcre:
|in
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Tomas Hoger changed:
What|Removed |Added
Blocks||1285420
--
You are receiving this mail
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Tomas Hoger changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2016 |impact=moderate,public=2016
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1321001, which changed state.
Bug 1321001 Summary: CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on
crafted regex when JIT is used [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1321001
What
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1320998, which changed state.
Bug 1320998 Summary: CVE-2014-9769 glib2: pcre: Segmentation fault on crafted
regex when JIT is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1320998
What|R
https://bugzilla.redhat.com/show_bug.cgi?id=1321001
Tomas Hoger changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1320999, which changed state.
Bug 1320999 Summary: CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on
crafted regex when JIT is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1320999
What
https://bugzilla.redhat.com/show_bug.cgi?id=1320999
Tomas Hoger changed:
What|Removed |Added
Status|NEW |CLOSED
Resolution|---
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1321000, which changed state.
Bug 1321000 Summary: CVE-2014-9769 mingw-pcre: pcre: Segmentation fault on
crafted regex when JIT is used [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1321000
What|
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1320997, which changed state.
Bug 1320997 Summary: CVE-2014-9769 mingw-pcre: pcre: Segmentation fault on
crafted regex when JIT is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1320997
What
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Tomas Hoger changed:
What|Removed |Added
Status|NEW |CLOSED
Fixed In Version|
https://bugzilla.redhat.com/show_bug.cgi?id=1320995
Bug 1320995 depends on bug 1321002, which changed state.
Bug 1321002 Summary: CVE-2014-9769 suricata: pcre: Segmentation fault on
crafted regex when JIT is used [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1321002
What
https://bugzilla.redhat.com/show_bug.cgi?id=1213957
Timothy Walsh changed:
What|Removed |Added
Depends On||1323038
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Timothy Walsh changed:
What|Removed |Added
Depends On||1323037
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Timothy Walsh changed:
What|Removed |Added
Depends On||1323035
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
Timothy Walsh changed:
What|Removed |Added
Depends On||1323034
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1317701
--- Comment #6 from Gene Hightower ---
All the other DLL did install with execute on my system:
So I assumed this was an oversight on the zlib package, hence I reported it.$
ls -l /usr/i686-w64-mingw32/sys-root/mingw/bin/*.dll
-rwxr-xr-x. 1 r
https://bugzilla.redhat.com/show_bug.cgi?id=1317701
--- Comment #5 from Michael Cronenworth ---
(In reply to Gene Hightower from comment #4)
> I'm not sure if DLLs without execute premissions work under Wine, I
> didn't try. But I would expect that case to fail also.
They will not fail. Wine
https://bugzilla.redhat.com/show_bug.cgi?id=1317701
--- Comment #4 from Gene Hightower ---
> Why does the version of Windows affect this? These are stored and
> used by a Linux host.
DLLs in ming??-*.noarch packages install on Fedora hosts and can be
used by programs running under Fedora's Li
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
Timothy Walsh changed:
What|Removed |Added
Depends On||1322872
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
Timothy Walsh changed:
What|Removed |Added
Depends On||1322869
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
Timothy Walsh changed:
What|Removed |Added
Depends On||1322867
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1213957
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=low,public=20151011, |impact=low,public=20151011,
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=low,public=20151008, |impact=low,public=20151008,
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=low,public=20150629, |impact=low,public=20150629,
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=low,public=20150222, |impact=low,public=20150222,
1 - 100 of 5082 matches
Mail list logo