https://bugzilla.redhat.com/show_bug.cgi?id=1281756
--- Comment #3 from Adam Mariš ---
Created mingw-libpng tracking bugs for this issue:
Affects: fedora-all [bug 1281758]
Affects: epel-7 [bug 1281760]
--
You are receiving this mail because:
You are on the CC list for
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
Adam Mariš changed:
What|Removed |Added
Blocks||1281763
--
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
--- Comment #4 from Paul Howarth ---
(In reply to Adam Mariš from comment #2)
> Created libpng10 tracking bugs for this issue:
>
> Affects: epel-6 [bug 1281759]
It affects fedora-all too. I'll edit the existing updates
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
Adam Mariš changed:
What|Removed |Added
Depends On||1281757
https://bugzilla.redhat.com/show_bug.cgi?id=1281760
Bug ID: 1281760
Summary: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions
[epel-7]
Product: Fedora EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=1281758
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281758
Bug ID: 1281758
Summary: CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions
[fedora-all]
Product: Fedora
https://bugzilla.redhat.com/show_bug.cgi?id=1281760
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
--- Comment #2 from Adam Mariš ---
Created libpng10 tracking bugs for this issue:
Affects: epel-6 [bug 1281759]
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug
https://bugzilla.redhat.com/show_bug.cgi?id=1213957
Adam Mariš changed:
What|Removed |Added
Blocks||1262850, 1276694
---
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
--- Comment #3 from Adam Mariš ---
Upstream patches:
https://git.gnome.org/browse/libxml2/commit/?id=bd0526e66a56e75a18da8c15c4750db8f801c52d
https://bugzilla.redhat.com/show_bug.cgi?id=1262849
--- Comment #4 from Adam Mariš ---
Upstream patch:
https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1213957
Adam Mariš changed:
What|Removed |Added
CC||ama...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1262849
Adam Mariš changed:
What|Removed |Added
Status|NEW |CLOSED
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
Jerry James changed:
What|Removed |Added
Status|NEW |ASSIGNED
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
Bug ID: 1281930
Summary: libxml2: Out-of-bounds heap read on 0xff char in xml
declaration
Product: Security Response
Component: vulnerability
Keywords: Security
https://bugzilla.redhat.com/show_bug.cgi?id=1281953
Bug ID: 1281953
Summary: mingw-libxml2: libxml2: Buffer overread with HTML
parser in push mode in xmlSAX2TextNode [epel-7]
Product: Fedora EPEL
Version: epel7
Component:
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
--- Comment #2 from Jerry James ---
Package Review
==
Legend:
[x] = Pass, [!] = Fail, [-] = Not applicable, [?] = Not evaluated
Issues:
===
- The Source0 URL doesn't work. The 685249 needs to be
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
Jerry James changed:
What|Removed |Added
Flags|fedora-review? |fedora-review+
https://bugzilla.redhat.com/show_bug.cgi?id=1281933
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281932
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
Adam Mariš changed:
What|Removed |Added
Depends On||1281931
https://bugzilla.redhat.com/show_bug.cgi?id=1281930
--- Comment #2 from Adam Mariš ---
Created mingw-libxml2 tracking bugs for this issue:
Affects: fedora-all [bug 1281932]
Affects: epel-7 [bug 1281933]
--
You are receiving this mail because:
You are on the CC list for
https://bugzilla.redhat.com/show_bug.cgi?id=1281933
Bug ID: 1281933
Summary: mingw-libxml2: libxml2: Out-of-bounds heap read on
0xff char in xml declaration [epel-7]
Product: Fedora EPEL
Version: epel7
Component:
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Adam Mariš changed:
What|Removed |Added
Blocks||1281961
--
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Adam Mariš changed:
What|Removed |Added
Blocks||1281961
--
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
--- Comment #4 from Sandro Mani ---
Uff, codeplex urls are just so unstable...
Thanks for the review!
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug
https://bugzilla.redhat.com/show_bug.cgi?id=1281932
Bug ID: 1281932
Summary: mingw-libxml2: libxml2: Out-of-bounds heap read on
0xff char in xml declaration [fedora-all]
Product: Fedora
Version: 23
Component: mingw-libxml2
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Adam Mariš changed:
What|Removed |Added
Depends On||1281937
https://bugzilla.redhat.com/show_bug.cgi?id=1281938
Bug ID: 1281938
Summary: mingw-libxml2: libxml2: Buffer overread with XML
parser in xmlNextChar [fedora-all]
Product: Fedora
Version: 23
Component: mingw-libxml2
https://bugzilla.redhat.com/show_bug.cgi?id=1281939
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281939
Bug ID: 1281939
Summary: mingw-libxml2: libxml2: Buffer overread with XML
parser in xmlNextChar [epel-7]
Product: Fedora EPEL
Version: epel7
Component: mingw-libxml2
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
--- Comment #2 from Adam Mariš ---
Created mingw-libxml2 tracking bugs for this issue:
Affects: fedora-all [bug 1281938]
Affects: epel-7 [bug 1281939]
--
You are receiving this mail because:
You are on the CC list for
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
--- Comment #5 from Jon Ciesla ---
Package request has been approved:
https://admin.fedoraproject.org/pkgdb/package/mingw-jxrlib
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1281936
Bug ID: 1281936
Summary: libxml2: Buffer overread with XML parser in
xmlNextChar
Product: Security Response
Component: vulnerability
Keywords: Security
Severity:
https://bugzilla.redhat.com/show_bug.cgi?id=1281938
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281952
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Adam Mariš changed:
What|Removed |Added
Depends On||1281951
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #2 from Adam Mariš ---
Created mingw-libxml2 tracking bugs for this issue:
Affects: fedora-all [bug 1281952]
Affects: epel-7 [bug 1281953]
--
You are receiving this mail because:
You are on the CC list for
https://bugzilla.redhat.com/show_bug.cgi?id=1281953
--- Comment #1 from Adam Mariš ---
Use the following template to for the 'fedpkg update' request to submit an
update for this issue as it contains the top-level parent bug(s) as well as
this tracking bug. This will ensure
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Bug ID: 1281950
Summary: libxml2: Buffer overread with HTML parser in push mode
in xmlSAX2TextNode
Product: Security Response
Component: vulnerability
Keywords: Security
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
Fedora Update System changed:
What|Removed |Added
Status|ASSIGNED
https://bugzilla.redhat.com/show_bug.cgi?id=1265854
--- Comment #6 from Fedora Update System ---
mingw-jxrlib-1.1-1.fc22 has been submitted as an update to Fedora 22.
https://bodhi.fedoraproject.org/updates/FEDORA-2015-3fe5e099ba
--
You are receiving this mail
https://bugzilla.redhat.com/show_bug.cgi?id=1281760
Richard W.M. Jones changed:
What|Removed |Added
Assignee|rjo...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1281758
Richard W.M. Jones changed:
What|Removed |Added
Assignee|rjo...@redhat.com
45 matches
Mail list logo