[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling
pattern with recursive reference in a group with indefinite repeat
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger <thoger(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |CLOSED
Resolution|--- |WONTFIX
Whiteboard|impact=low,public=20140807, |impact=low,public=20140807,
|reported=20151125,source=os |reported=20151125,source=os
|s-security,cvss2=4.3/AV:N/A |s-security,cvss2=4.3/AV:N/A
|C:M/Au:N/C:N/I:N/A:P,cwe=CW |C:M/Au:N/C:N/I:N/A:P,cwe=CW
|E-674,rhel-5/pcre=notaffect |E-674,rhel-5/pcre=notaffect
|ed,rhel-6/pcre=notaffected, |ed,rhel-6/pcre=notaffected,
|rhel-7/pcre=affected,fedora |rhel-7/pcre=wontfix,fedora-
|-all/pcre=notaffected,fedor |all/pcre=notaffected,fedora
|a-all/mingw-pcre=notaffecte |-all/mingw-pcre=notaffected
|d,epel-7/mingw-pcre=affecte |,epel-7/mingw-pcre=affected
|d,rhel-6/glib2=notaffected, |,rhel-6/glib2=notaffected,r
|rhel-7/glib2=affected,fedor |hel-7/glib2=wontfix,fedora-
|a-all/glib2=affected,fedora |all/glib2=affected,fedora-a
|-all/mingw-glib2=affected,e |ll/mingw-glib2=affected,epe
|pel-7/mingw-glib2=affected, |l-7/mingw-glib2=affected,rh
|rhel-7/virtuoso-opensource= |el-7/virtuoso-opensource=no
|notaffected,rhscl-2/php54-p |taffected,rhscl-2/php54-php
|hp=affected,rhscl-2/php55-p |=wontfix,rhscl-2/php55-php=
|hp=affected,rhscl-2/rh-php5 |wontfix,rhscl-2/rh-php56-ph
|6-php=affected,rhscl-2/rh-m |p=wontfix,rhscl-2/rh-mariad
|ariadb100-mariadb=notaffect |b100-mariadb=notaffected,rh
|ed,rhscl-2/rh-mariadb101-ma |scl-2/rh-mariadb101-mariadb
|riadb=notaffected,jbews-1/h |=notaffected,jbews-1/httpd=
|ttpd=notaffected,jbews-2/ht |notaffected,jbews-2/httpd=n
|tpd=notaffected,jbews-3/pcr |otaffected,jbews-3/pcre=won
|e=wontfix,directory_server_ |tfix,directory_server_8/pcr
|8/pcre=notaffected |e=notaffected
Last Closed| |2016-02-18 06:45:15
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 2 months
[Bug 1285399] CVE-2015-2328 pcre: infinite recursion compiling
pattern with recursive reference in a group with indefinite repeat
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1285399
Tomas Hoger <thoger(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |adam.stokes(a)gmail.com,
| |andrew(a)beekhof.net,
| |csutherl(a)redhat.com,
| |databases-maint(a)redhat.com,
| |dknox(a)redhat.com,
| |erik-fedora(a)vanpienbroek.nl
| |,
| |fedora-mingw(a)lists.fedorapr
| |oject.org,
| |fidencio(a)redhat.com,
| |jclere(a)redhat.com,
| |jdornak(a)redhat.com,
| |jdoyle(a)redhat.com,
| |jgrulich(a)redhat.com,
| |klember(a)redhat.com,
| |lgao(a)redhat.com,
| |marcandre.lureau(a)redhat.com
| |, mbabacek(a)redhat.com,
| |mclasen(a)redhat.com,
| |myarboro(a)redhat.com,
| |pmyers(a)valanet.net,
| |pslavice(a)redhat.com,
| |rjones(a)redhat.com,
| |rsvoboda(a)redhat.com,
| |t.sailer(a)alumni.ethz.ch,
| |twalsh(a)redhat.com,
| |walters(a)redhat.com,
| |weli(a)redhat.com
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 2 months
[Bug 1287636] CVE-2015-8386 pcre: Buffer overflow caused by
lookbehind assertion
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1287636
Tomas Hoger <thoger(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |csutherl(a)redhat.com,
| |databases-maint(a)redhat.com,
| |dknox(a)redhat.com,
| |fedora-mingw(a)lists.fedorapr
| |oject.org,
| |fidencio(a)redhat.com,
| |jclere(a)redhat.com,
| |jdornak(a)redhat.com,
| |jdoyle(a)redhat.com,
| |klember(a)redhat.com,
| |lgao(a)redhat.com,
| |marcandre.lureau(a)redhat.com
| |, mbabacek(a)redhat.com,
| |myarboro(a)redhat.com,
| |pslavice(a)redhat.com,
| |rjones(a)redhat.com,
| |rsvoboda(a)redhat.com,
| |t.sailer(a)alumni.ethz.ch,
| |twalsh(a)redhat.com,
| |weli(a)redhat.com
--
You are receiving this mail because:
You are on the CC list for the bug.
8 years, 2 months
[Bug 1281952] New: mingw-libxml2: libxml2: Buffer overread with HTML parser in push mode in xmlSAX2TextNode [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1281952
Bug ID: 1281952
Summary: mingw-libxml2: libxml2: Buffer overread with HTML
parser in push mode in xmlSAX2TextNode [fedora-all]
Product: Fedora
Version: 23
Component: mingw-libxml2
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: rjones(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com, veillard(a)redhat.com
Blocks: 1281950
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1281950
[Bug 1281950] libxml2: Buffer overread with HTML parser in push mode in
xmlSAX2TextNode
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=onjZDgIxYw&a=cc_unsubscribe
8 years, 2 months
[Bug 1277149] New: mingw-libxml2: libxml2: DoS when parsing specially crafted XML document if XZ support is enabled [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1277149
Bug ID: 1277149
Summary: mingw-libxml2: libxml2: DoS when parsing specially
crafted XML document if XZ support is enabled
[fedora-all]
Product: Fedora
Version: 22
Component: mingw-libxml2
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com, veillard(a)redhat.com
Blocks: 1277146
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1277146
[Bug 1277146] libxml2: DoS when parsing specially crafted XML document if
XZ support is enabled
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=6QqISaRX8I&a=cc_unsubscribe
8 years, 2 months
[Bug 1276299] New: CVE-2015-7942 mingw-libxml2: libxml2: heap-based buffer overflow in xmlParseConditionalSections() [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1276299
Bug ID: 1276299
Summary: CVE-2015-7942 mingw-libxml2: libxml2: heap-based
buffer overflow in xmlParseConditionalSections()
[fedora-all]
Product: Fedora
Version: 22
Component: mingw-libxml2
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: mprpic(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: drizt(a)land.ru, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com, veillard(a)redhat.com
Blocks: 1276297 (CVE-2015-7942)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1276297
[Bug 1276297] CVE-2015-7942 libxml2: heap-based buffer overflow in
xmlParseConditionalSections()
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=fZhozt3A5i&a=cc_unsubscribe
8 years, 2 months
[Bug 1274225] New: mingw-libxml2: libxml2: Out-of-bounds memory access [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1274225
Bug ID: 1274225
Summary: mingw-libxml2: libxml2: Out-of-bounds memory access
[fedora-all]
Product: Fedora
Version: 22
Component: mingw-libxml2
Keywords: Security, SecurityTracking
Severity: low
Priority: low
Assignee: rjones(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: drizt(a)land.ru, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com, veillard(a)redhat.com
Blocks: 1274222
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1274222
[Bug 1274222] libxml2: Out-of-bounds memory access
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=wUyBa6ppBZ&a=cc_unsubscribe
8 years, 2 months
[Bug 1262853] New: mingw-libxml2: libxml2: Out-of-bounds memory access when parsing unclosed HTMl comment [fedora-all]
by Red Hat Bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1262853
Bug ID: 1262853
Summary: mingw-libxml2: libxml2: Out-of-bounds memory access
when parsing unclosed HTMl comment [fedora-all]
Product: Fedora
Version: 22
Component: mingw-libxml2
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: amaris(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: drizt(a)land.ru, erik-fedora(a)vanpienbroek.nl,
fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com, veillard(a)redhat.com
Blocks: 1262849
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When submitting as an update, use the fedpkg template provided in the next
comment(s). This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.
NOTE: this issue affects multiple supported versions of Fedora. While only
one tracking bug has been filed, please correct all affected versions at
the same time. If you need to fix the versions independent of each other,
you may clone this bug as appropriate.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1262849
[Bug 1262849] libxml2: Out-of-bounds memory access when parsing unclosed
HTMl comment
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=LE5Z3j5KiV&a=cc_unsubscribe
8 years, 2 months