[Bug 1281756] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281756 --- Comment #3 from Adam Mariš --- Created mingw-libpng tracking bugs for this issue: Affects: fedora-all [bug 1281758] Affects: epel-7 [bug 1281760] -- You are receiving this mail because: You are on the CC list for

[Bug 1281756] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281756 Adam Mariš changed: What|Removed |Added Blocks||1281763 -- You are

[Bug 1281756] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281756 --- Comment #4 from Paul Howarth --- (In reply to Adam Mariš from comment #2) > Created libpng10 tracking bugs for this issue: > > Affects: epel-6 [bug 1281759] It affects fedora-all too. I'll edit the existing updates

[Bug 1281756] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281756 Adam Mariš changed: What|Removed |Added Depends On||1281757

[Bug 1281760] New: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281760 Bug ID: 1281760 Summary: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7] Product: Fedora EPEL

[Bug 1281758] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281758 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281758] New: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281758 Bug ID: 1281758 Summary: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all] Product: Fedora

[Bug 1281760] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281760 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281756] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281756 --- Comment #2 from Adam Mariš --- Created libpng10 tracking bugs for this issue: Affects: epel-6 [bug 1281759] -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug

[Bug 1213957] libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 Adam Mariš changed: What|Removed |Added Blocks||1262850, 1276694 ---

[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in xmlParseConditionalSections()

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276297 --- Comment #3 from Adam Mariš --- Upstream patches: https://git.gnome.org/browse/libxml2/commit/?id=bd0526e66a56e75a18da8c15c4750db8f801c52d

[Bug 1262849] libxml2: Out-of-bounds memory access when parsing unclosed HTML comment

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1262849 --- Comment #4 from Adam Mariš --- Upstream patch: https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c -- You are receiving this mail because: You are on the CC list for the bug.

[Bug 1213957] libxml2: out-of-bounds memory access when parsing an unclosed HTML comment

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1213957 Adam Mariš changed: What|Removed |Added CC||ama...@redhat.com

[Bug 1262849] libxml2: Out-of-bounds memory access when parsing unclosed HTML comment

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1262849 Adam Mariš changed: What|Removed |Added Status|NEW |CLOSED

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 Jerry James changed: What|Removed |Added Status|NEW |ASSIGNED

[Bug 1281930] New: libxml2: Out-of-bounds heap read on 0xff char in xml declaration

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 Bug ID: 1281930 Summary: libxml2: Out-of-bounds heap read on 0xff char in xml declaration Product: Security Response Component: vulnerability Keywords: Security

[Bug 1281953] New: mingw-libxml2: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281953 Bug ID: 1281953 Summary: mingw-libxml2: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode [epel-7] Product: Fedora EPEL Version: epel7 Component:

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 --- Comment #2 from Jerry James --- Package Review == Legend: [x] = Pass, [!] = Fail, [-] = Not applicable, [?] = Not evaluated Issues: === - The Source0 URL doesn't work. The 685249 needs to be

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 Jerry James changed: What|Removed |Added Flags|fedora-review? |fedora-review+

[Bug 1281933] mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281933 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281932] mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281932 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281930] libxml2: Out-of-bounds heap read on 0xff char in xml declaration

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 Adam Mariš changed: What|Removed |Added Depends On||1281931

[Bug 1281930] libxml2: Out-of-bounds heap read on 0xff char in xml declaration

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281930 --- Comment #2 from Adam Mariš --- Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1281932] Affects: epel-7 [bug 1281933] -- You are receiving this mail because: You are on the CC list for

[Bug 1281933] New: mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281933 Bug ID: 1281933 Summary: mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [epel-7] Product: Fedora EPEL Version: epel7 Component:

[Bug 1281950] libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 Adam Mariš changed: What|Removed |Added Blocks||1281961 -- You are

[Bug 1281936] libxml2: Buffer overread with XML parser in xmlNextChar

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 Adam Mariš changed: What|Removed |Added Blocks||1281961 -- You are

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 --- Comment #4 from Sandro Mani --- Uff, codeplex urls are just so unstable... Thanks for the review! -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug

[Bug 1281932] New: mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281932 Bug ID: 1281932 Summary: mingw-libxml2: libxml2: Out-of-bounds heap read on 0xff char in xml declaration [fedora-all] Product: Fedora Version: 23 Component: mingw-libxml2

[Bug 1281936] libxml2: Buffer overread with XML parser in xmlNextChar

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 Adam Mariš changed: What|Removed |Added Depends On||1281937

[Bug 1281938] New: mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281938 Bug ID: 1281938 Summary: mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [fedora-all] Product: Fedora Version: 23 Component: mingw-libxml2

[Bug 1281939] mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281939 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281939] New: mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281939 Bug ID: 1281939 Summary: mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [epel-7] Product: Fedora EPEL Version: epel7 Component: mingw-libxml2

[Bug 1281936] libxml2: Buffer overread with XML parser in xmlNextChar

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 --- Comment #2 from Adam Mariš --- Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1281938] Affects: epel-7 [bug 1281939] -- You are receiving this mail because: You are on the CC list for

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 --- Comment #5 from Jon Ciesla --- Package request has been approved: https://admin.fedoraproject.org/pkgdb/package/mingw-jxrlib -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe

[Bug 1281936] New: libxml2: Buffer overread with XML parser in xmlNextChar

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281936 Bug ID: 1281936 Summary: libxml2: Buffer overread with XML parser in xmlNextChar Product: Security Response Component: vulnerability Keywords: Security Severity:

[Bug 1281938] mingw-libxml2: libxml2: Buffer overread with XML parser in xmlNextChar [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281938 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281952] mingw-libxml2: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281952 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281950] libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 Adam Mariš changed: What|Removed |Added Depends On||1281951

[Bug 1281950] libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 --- Comment #2 from Adam Mariš --- Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1281952] Affects: epel-7 [bug 1281953] -- You are receiving this mail because: You are on the CC list for

[Bug 1281953] mingw-libxml2: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281953 --- Comment #1 from Adam Mariš --- Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure

[Bug 1281950] New: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281950 Bug ID: 1281950 Summary: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode Product: Security Response Component: vulnerability Keywords: Security

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 Fedora Update System changed: What|Removed |Added Status|ASSIGNED

[Bug 1265854] Review Request: mingw-jxrlib - MinGW Windows JPEG XR library

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1265854 --- Comment #6 from Fedora Update System --- mingw-jxrlib-1.1-1.fc22 has been submitted as an update to Fedora 22. https://bodhi.fedoraproject.org/updates/FEDORA-2015-3fe5e099ba -- You are receiving this mail

[Bug 1281760] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281760 Richard W.M. Jones changed: What|Removed |Added Assignee|rjo...@redhat.com

[Bug 1281758] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all]

2015-11-13 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281758 Richard W.M. Jones changed: What|Removed |Added Assignee|rjo...@redhat.com