[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2024-12-06 Thread bugzilla via perl-devel
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Doc Text *updated* by OSIDB Bzimport --- A heap based buffer overflow exists in the libyaml package such that an attacker by supplying a specially crafted yaml document when parsed by the application might result in remote code execution

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2016-03-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Ján Rusnačko changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2015-11-25 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Ján Rusnačko changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2015-10-15 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Vincent Danen changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2015-10-15 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Vincent Danen changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-11-18 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Depends On||1165358 -- You are receiving this ma

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-11-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Depends On||1161460 -- You are receiving this ma

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-11-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-11-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-11-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Depends On||1160976 -- You are receiving this ma

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Depends On||1159403 Depends On|

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-10-31 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Marianne Feifer changed: What|Removed |Added CC|mfei...@redhat.com | Kurt Seifried changed:

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-10-28 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-09-05 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Kurt Seifried changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-17 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #38 from errata-xmlrpc --- This issue has been addressed in following products: Red Hat Common for RHEL 6 Via RHSA-2014:0415 https://rhn.redhat.com/errata/RHSA-2014-0415.html -- You are receiving this mail because: You are on

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-15 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #37 from Fedora Update System --- libyaml-0.1.2-7.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: You are

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-15 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #36 from Fedora Update System --- libyaml-0.1.6-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: You are

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-15 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Bug 1078083 depends on bug 1081856, which changed state. Bug 1081856 Summary: CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=1081856 What|Removed

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #35 from Fedora Update System --- perl-YAML-LibYAML-0.38-4.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because:

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-11 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Bug 1078083 depends on bug 1081383, which changed state. Bug 1081383 Summary: CVE-2014-2525 perl-YAML-LibYAML: libyaml: heap-based buffer overflow when parsing URLs [epel-6] https://bugzilla.redhat.com/show_bug.cgi?id=1081383 What

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #34 from Fedora Update System --- perl-YAML-LibYAML-0.41-4.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: Yo

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #33 from Fedora Update System --- perl-YAML-LibYAML-0.41-4.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: Yo

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-06 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Bug 1078083 depends on bug 1081382, which changed state. Bug 1081382 Summary: CVE-2014-2525 perl-YAML-LibYAML: libyaml: heap-based buffer overflow when parsing URLs [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1081382 Wha

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #32 from Fedora Update System --- libyaml-0.1.6-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: You are on

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #31 from Fedora Update System --- libyaml-0.1.6-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. -- You are receiving this mail because: You are on

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-04 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Bug 1078083 depends on bug 1081281, which changed state. Bug 1081281 Summary: CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1081281 What|Removed

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-03 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #30 from errata-xmlrpc --- This issue has been addressed in following products: OpenStack 3 for RHEL 6 Via RHSA-2014:0364 https://rhn.redhat.com/errata/RHSA-2014-0364.html -- You are receiving this mail because: You are on th

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-02 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #29 from errata-xmlrpc --- This issue has been addressed in following products: OpenStack 3 for RHEL 6 Via RHSA-2014:0353 https://rhn.redhat.com/errata/RHSA-2014-0353.html -- You are receiving this mail because: You are on th

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-02 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #28 from errata-xmlrpc --- This issue has been addressed in following products: OpenStack 4 for RHEL 6 Via RHSA-2014:0354 https://rhn.redhat.com/errata/RHSA-2014-0354.html -- You are receiving this mail because: You are on th

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-02 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #27 from errata-xmlrpc --- This issue has been addressed in following products: Red Hat Software Collections for RHEL-6 Via RHSA-2014:0355 https://rhn.redhat.com/errata/RHSA-2014-0355.html -- You are receiving this mail becau

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-04-02 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Tomas Hoger changed: What|Removed |Added Depends On||1083710 Depends On|

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-28 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Tomas Hoger changed: What|Removed |Added Whiteboard|impact=important,public=201 |impact=important,public=201

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #24 from Murray McAllister --- (In reply to John Eckersberg from comment #22) > Can you please create a tracking bug for epel-all as well? Done. Sorry about that! -- You are receiving this mail because: You are on the CC list fo

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Murray McAllister changed: What|Removed |Added Depends On||1081856 --- Comment #23 from Murr

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 --- Comment #22 from John Eckersberg --- Can you please create a tracking bug for epel-all as well? -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Murray McAllister changed: What|Removed |Added Depends On||1081382 Depends On|

[Bug 1078083] CVE-2014-2525 libyaml: heap-based buffer overflow when parsing URLs

2014-03-27 Thread bugzilla
https://bugzilla.redhat.com/show_bug.cgi?id=1078083 Murray McAllister changed: What|Removed |Added CC||bgoll...@redhat.com,