https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #16 from errata-xmlrpc ---
This issue has been addressed in the following products:
Via RHSA-2016:1089 https://rhn.redhat.com/errata/RHSA-2016-1089.html
--
You are receiving this mail because:
You
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Doc Text *updated* by Martin Prpic ---
A denial of service flaw was found in libxml2. A remote attacker could provide
a specially crafted XML or HTML file that, when processed by an application
using libxml2, would
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Doc Text *updated* by Timothy Walsh ---
A stack-based buffer over-read flaw was found in libxml2 in the xmlSAX2TextNode
function in SAX2.c that allows context-dependent attackers to cause a denial of
service or obtain
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Timothy Walsh changed:
What|Removed |Added
Whiteboard|impact=low,public=20151011,
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Bug 1281950 depends on bug 1281953, which changed state.
Bug 1281953 Summary: mingw-libxml2: libxml2: Buffer overread with HTML parser
in push mode in xmlSAX2TextNode [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1281953
What
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Bug 1281950 depends on bug 1281952, which changed state.
Bug 1281952 Summary: mingw-libxml2: libxml2: Buffer overread with HTML parser
in push mode in xmlSAX2TextNode [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1281952
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #11 from errata-xmlrpc ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 6
Via RHSA-2015:2549 https://rhn.redhat.com/errata/RHSA-2015-2549.html
--
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #12 from errata-xmlrpc ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2015:2550 https://rhn.redhat.com/errata/RHSA-2015-2550.html
--
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Martin Cermak changed:
What|Removed |Added
CC||mcer...@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Huzaifa S. Sidhpurwala changed:
What|Removed |Added
Blocks||1274223
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Huzaifa S. Sidhpurwala changed:
What|Removed |Added
Depends On||1284794
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
--- Comment #5 from Adam Mariš ---
Upstream patch:
https://git.gnome.org/browse/libxml2/commit/?id=8fb4a770075628d6441fb17a1e435100e2f3b1a2
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
Adam Mariš changed:
What|Removed |Added
Summary|libxml2: Buffer overread|CVE-2015-8242 libxml2:
13 matches
Mail list logo