[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 --- Comment #16 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Comment #13 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 --- Comment #13 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1213957] CVE-2015-8710 libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 --- Comment #17 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 --- Comment #13 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 --- Comment #14 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-05-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 --- Comment #12 from errata-xmlrpc --- This issue has been addressed in the following products: Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html -- You are receiving this mail because: You are on the CC list for the bu

[Bug 1335683] [Patch] Fix static libraries

2016-05-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1335683 Richard W.M. Jones changed: What|Removed |Added Attachment|application/mbox|text/plain #1156933 mime type|

[Bug 1335683] [Patch] Fix static libraries

2016-05-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1335683 Richard W.M. Jones changed: What|Removed |Added Assignee|rjo...@redhat.com |klem...@redhat.com -- You are r

[Bug 1306047] [Patch] Fix static library

2016-05-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1306047 --- Comment #11 from Kalev Lember --- Can you send this upstream to https://bugzilla.gnome.org/enter_bug.cgi?product=glib , please? And maybe ask nacho to review it on IRC afterwards? Thanks! -- You are receiving this mail because: You are

[Bug 1335683] [Patch] Fix static libraries

2016-05-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1335683 Kalev Lember changed: What|Removed |Added CC||klem...@redhat.com --- Comment #2 from

[Bug 1335683] [Patch] Fix static libraries

2016-05-12 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1335683 --- Comment #1 from Sandro Mani --- Created attachment 1156934 --> https://bugzilla.redhat.com/attachment.cgi?id=1156934&action=edit Patch: fix FTBFS -- You are receiving this mail because: You are on the CC list for the bug. _

[Bug 1335683] New: [Patch] Fix static libraries

2016-05-12 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1335683 Bug ID: 1335683 Summary: [Patch] Fix static libraries Product: Fedora Version: rawhide Component: mingw-cairo Assignee: rjo...@redhat.com Reporter: manisan...@gmail.com

[Bug 1306047] [Patch] Fix static library

2016-05-12 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1306047 Sandro Mani changed: What|Removed |Added Version|24 |rawhide -- You are receiving this mail

[Bug 1306047] [Patch] Fix static library

2016-05-12 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1306047 Sandro Mani changed: What|Removed |Added Attachment|0 |1 #1122789 is|

[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)

2016-05-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399 Tomas Hoger changed: What|Removed |Added Status|NEW |CLOSED Resolution|---

[Bug 1311503] CVE-2016-3191 pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)

2016-05-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 --- Comment #6 from errata-xmlrpc --- This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html -- You are receiving this mail because: You ar

[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)

2016-05-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636 --- Comment #16 from errata-xmlrpc --- This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html -- You are receiving this mail because: You a

[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)

2016-05-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399 --- Comment #6 from errata-xmlrpc --- This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2016:1025 https://rhn.redhat.com/errata/RHSA-2016-1025.html -- You are receiving this mail because: You ar

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-05-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 --- Doc Text *updated* by Martin Prpic --- A denial of service flaw was found in libxml2. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application

[Bug 1332833] New: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [epel-7]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332833 Bug ID: 1332833 Summary: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [epel-7] Product: Fedora EPEL Version: epel7 Component: ming

[Bug 1332832] CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [fedora-all]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332832 --- Comment #1 from Andrej Nemec --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associat

[Bug 1332833] CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [epel-7]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332833 --- Comment #1 from Andrej Nemec --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associat

[Bug 1332832] New: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [fedora-all]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332832 Bug ID: 1332832 Summary: CVE-2016-3705 mingw-libxml2: libxml2: stack overflow before detecting invalid XML file [fedora-all] Product: Fedora Version: 23 Component: mingw-li

[Bug 1332820] CVE-2016-4483 libxml2: out-of-bounds read

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 Andrej Nemec changed: What|Removed |Added Blocks||1332827 -- You are receiving this mai

[Bug 1332824] CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read [fedora-all]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332824 Andrej Nemec changed: What|Removed |Added Summary|CVE-2016-4483 |CVE-2016-4483 |mingw-l

[Bug 1332825] CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read [epel-7]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332825 Andrej Nemec changed: What|Removed |Added Summary|CVE-2016-4483 |CVE-2016-4483 |mingw-l

[Bug 1332820] CVE-2016-4483 libxml2: out-of-bounds read

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 Andrej Nemec changed: What|Removed |Added Summary|CVE-2016-4483 libxml2: |CVE-2016-4483 libxml2:

[Bug 1332820] CVE-2016-4483 libxml2: out-of-bounds read parsing a

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 --- Comment #2 from Andrej Nemec --- Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1332824] Affects: epel-7 [bug 1332825] -- You are receiving this mail because: You are on the CC list for the bug. __

[Bug 1332820] CVE-2016-4483 libxml2: out-of-bounds read parsing a

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 Andrej Nemec changed: What|Removed |Added Depends On||1332823 Depends On|

[Bug 1332825] CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [epel-7]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332825 --- Comment #1 from Andrej Nemec --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associat

[Bug 1332824] CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [fedora-all]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332824 --- Comment #1 from Andrej Nemec --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associat

[Bug 1332825] New: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [epel-7]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332825 Bug ID: 1332825 Summary: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [epel-7] Product: Fedora EPEL Version: epel7 Component: mingw-libxml2

[Bug 1332824] New: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [fedora-all]

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332824 Bug ID: 1332824 Summary: CVE-2016-4483 mingw-libxml2: libxml2: out-of-bounds read parsing a [fedora-all] Product: Fedora Version: 23 Component: mingw-libxml2 Keyw

[Bug 1332820] CVE-2016-4483 libxml2: out-of-bounds read parsing a

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 Andrej Nemec changed: What|Removed |Added Whiteboard|impact=moderate,public=2016 |impact=moderate,public=2016

[Bug 1332820] New: CVE-2016-4483 libxml2: out-of-bounds read parsing a

2016-05-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1332820 Bug ID: 1332820 Summary: CVE-2016-4483 libxml2: out-of-bounds read parsing a Product: Security Response Component: vulnerability Keywords: Security Severity: medium Priority

[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636 Tomas Hoger changed: What|Removed |Added Depends On||1330508 Depends On|

[Bug 1311503] CVE-2016-3191 pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 Tomas Hoger changed: What|Removed |Added Depends On||1330508 Depends On|

[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399 Tomas Hoger changed: What|Removed |Added Depends On||1330508 Depends On|

[Bug 1311503] CVE-2016-3191 pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 Tomas Hoger changed: What|Removed |Added Depends On||1330494 -- You are receiving this mail

[Bug 1311503] CVE-2016-3191 pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 Tomas Hoger changed: What|Removed |Added Depends On||1330490 Depends On|

[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636 Tomas Hoger changed: What|Removed |Added Depends On||1330455 Depends On|

[Bug 1287614] CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group (8.38/3)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287614 Tomas Hoger changed: What|Removed |Added Depends On||1330455 Depends On|

[Bug 1311503] CVE-2016-3191 pcre: workspace overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 10.22/12)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1311503 Tomas Hoger changed: What|Removed |Added Priority|medium |high Whiteboard|impact=moderate,p

[Bug 1287614] CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group (8.38/3)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287614 Tomas Hoger changed: What|Removed |Added Priority|medium |high Whiteboard|impact=moderate,p

[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636 Martin Prpic changed: What|Removed |Added Priority|high|low Severity|high

[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)

2016-04-26 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399 Tomas Hoger changed: What|Removed |Added Priority|low |medium Status|CLOSED

[Bug 1304636] CVE-2015-8806 libxml2: heap-buffer overread in dict.c

2016-04-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1304636 --- Comment #4 from Cedric Buissart --- I believe that this is actually a duplicate of CVE-2016-2073 -- You are receiving this mail because: You are on the CC list for the bug. ___ mingw mailing li

[Bug 1301928] CVE-2016-2073 libxml2: out-of-bounds read in htmlParseNameComplex()

2016-04-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1301928 Cedric Buissart changed: What|Removed |Added CC||cbuis...@redhat.com --- Comment #3

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-04-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Doc Text *updated* by Timothy Walsh --- A heap-based buffer over-read flaw was found libxml2. The xmlNextChar function in libxml2 does not properly check the state, which allows context-dependent attackers to cause an application crash a

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-04-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 --- Doc Text *updated* by Timothy Walsh --- A vulnerability in libxml2 was found that caused a denial of service when parsing specially crafted XML document with XZ support is enabled. -- You are receiving this mail because: You are on the

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-04-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 --- Doc Text *updated* by Timothy Walsh --- A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application link

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-04-21 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 --- Doc Text *updated* by Timothy Walsh --- It was found that libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted

[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 --- Doc Text *updated* by Timothy Walsh --- A stack-based buffer over-read flaw was found in libxml2 in the xmlSAX2TextNode function in SAX2.c that allows context-dependent attackers to cause a denial of service or obtain sensitive informatio

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Doc Text *updated* by Timothy Walsh --- A buffer over-read flaw was found in libxml2 in xmlNextChar causing segmentation fault when compiled with ASAN. -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 --- Doc Text *updated* by Timothy Walsh --- An out-of-bounds head read flaw was found in libxml2 in the xmlParseXMLDecl function in parser.c that allows context-dependent attackers to obtain sensitive information via an unterminated encoding

[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 --- Doc Text *updated* by Timothy Walsh --- A stack-based buffer over-read vulnerability was found in libxml2 in the xmlSAX2TextNode function in SAX2.c that allows context-dependent attackers to cause a denial of service or obtain sensitive i

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Doc Text *updated* by Timothy Walsh --- A buffer over-read vulnerability was found in libxml2 in xmlNextChar causing segmentation fault when compiled with ASAN. -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 --- Doc Text *updated* by Timothy Walsh --- An out-of-bounds head read vulnerability was found in libxml2 in the xmlParseXMLDecl function in parser.c that allows context-dependent attackers to obtain sensitive information via an unterminated

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 --- Doc Text *updated* by Timothy Walsh --- A vulnerability in libxml2 was found that caused a Dos when parsing specially crafted XML document with XZ support is enabled. -- You are receiving this mail because: You are on the CC list for th

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 --- Doc Text *updated* by Martin Prpic --- A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linke

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-04-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 --- Doc Text *updated* by Timothy Walsh --- A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially-crafted XML file that, when opened in an application link

[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by lookbehind assertion (8.38/6)

2016-04-14 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636 shiwang changed: What|Removed |Added Priority|low |high Severity|low

[Bug 1287614] CVE-2015-8383 pcre: Buffer overflow caused by repeated conditional group (8.38/3)

2016-04-08 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287614 Tomas Hoger changed: What|Removed |Added Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015

[Bug 1324743] New: mingw64-configure and mingw32-configure ignore --prefix option

2016-04-07 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1324743 Bug ID: 1324743 Summary: mingw64-configure and mingw32-configure ignore --prefix option Product: Fedora Version: 23 Component: mingw32-filesystem Assignee: extras

[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling pattern with recursive reference in a group with indefinite repeat (8.36/20)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399 Tomas Hoger changed: What|Removed |Added Summary|CVE-2015-2328 pcre: |CVE-2015-2328 pcre: |in

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Tomas Hoger changed: What|Removed |Added Blocks||1285420 -- You are receiving this mail

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Tomas Hoger changed: What|Removed |Added Whiteboard|impact=moderate,public=2016 |impact=moderate,public=2016

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1321001, which changed state. Bug 1321001 Summary: CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on crafted regex when JIT is used [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1321001 What

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1320998, which changed state. Bug 1320998 Summary: CVE-2014-9769 glib2: pcre: Segmentation fault on crafted regex when JIT is used [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1320998 What|R

[Bug 1321001] CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on crafted regex when JIT is used [epel-7]

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1321001 Tomas Hoger changed: What|Removed |Added Status|NEW |CLOSED Resolution|---

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1320999, which changed state. Bug 1320999 Summary: CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on crafted regex when JIT is used [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1320999 What

[Bug 1320999] CVE-2014-9769 mingw-glib2: pcre: Segmentation fault on crafted regex when JIT is used [fedora-all]

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320999 Tomas Hoger changed: What|Removed |Added Status|NEW |CLOSED Resolution|---

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1321000, which changed state. Bug 1321000 Summary: CVE-2014-9769 mingw-pcre: pcre: Segmentation fault on crafted regex when JIT is used [epel-7] https://bugzilla.redhat.com/show_bug.cgi?id=1321000 What|

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1320997, which changed state. Bug 1320997 Summary: CVE-2014-9769 mingw-pcre: pcre: Segmentation fault on crafted regex when JIT is used [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1320997 What

[Bug 1320995] CVE-2014-9769 pcre: incorrect nested table jumps when JIT is used (8.36/6)

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Tomas Hoger changed: What|Removed |Added Status|NEW |CLOSED Fixed In Version|

[Bug 1320995] CVE-2014-9769 pcre: Segmentation fault on crafted regex when JIT is used

2016-04-01 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1320995 Bug 1320995 depends on bug 1321002, which changed state. Bug 1321002 Summary: CVE-2014-9769 suricata: pcre: Segmentation fault on crafted regex when JIT is used [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1321002 What

[Bug 1213957] CVE-2015-8710 libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 Timothy Walsh changed: What|Removed |Added Depends On||1323038 -- You are receiving this ma

[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 Timothy Walsh changed: What|Removed |Added Depends On||1323037 -- You are receiving this ma

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 Timothy Walsh changed: What|Removed |Added Depends On||1323035 -- You are receiving this ma

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 Timothy Walsh changed: What|Removed |Added Depends On||1323034 -- You are receiving this ma

[Bug 1317701] zlib1.dll missing execute premission

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1317701 --- Comment #6 from Gene Hightower --- All the other DLL did install with execute on my system: So I assumed this was an oversight on the zlib package, hence I reported it.$ ls -l /usr/i686-w64-mingw32/sys-root/mingw/bin/*.dll -rwxr-xr-x. 1 r

[Bug 1317701] zlib1.dll missing execute premission

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1317701 --- Comment #5 from Michael Cronenworth --- (In reply to Gene Hightower from comment #4) > I'm not sure if DLLs without execute premissions work under Wine, I > didn't try. But I would expect that case to fail also. They will not fail. Wine

[Bug 1317701] zlib1.dll missing execute premission

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1317701 --- Comment #4 from Gene Hightower --- > Why does the version of Windows affect this? These are stored and > used by a Linux host. DLLs in ming??-*.noarch packages install on Fedora hosts and can be used by programs running under Fedora's Li

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 Timothy Walsh changed: What|Removed |Added Depends On||1322872 -- You are receiving this ma

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 Timothy Walsh changed: What|Removed |Added Depends On||1322869 -- You are receiving this ma

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 Timothy Walsh changed: What|Removed |Added Depends On||1322867 -- You are receiving this ma

[Bug 1213957] CVE-2015-8710 libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015

[Bug 1281950] CVE-2015-8242 libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=low,public=20151011, |impact=low,public=20151011,

[Bug 1281936] CVE-2015-8241 libxml2: Buffer overread with XML parser in xmlNextChar

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=low,public=20151008, |impact=low,public=20151008,

[Bug 1281930] CVE-2015-8317 libxml2: Out-of-bounds heap read when parsing file with unfinished xml declaration

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=low,public=20150629, |impact=low,public=20150629,

[Bug 1277146] CVE-2015-8035 libxml2: DoS when parsing specially crafted XML document if XZ support is enabled

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277146 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=moderate,public=2015 |impact=moderate,public=2015

[Bug 1274222] CVE-2015-7941 libxml2: Out-of-bounds memory access

2016-03-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274222 Timothy Walsh changed: What|Removed |Added Whiteboard|impact=low,public=20150222, |impact=low,public=20150222,

  1   2   3   4   5   6   7   8   9   10   >