https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Doc Text *updated* by OSIDB Bzimport ---
A heap based buffer overflow exists in the libyaml package such that an
attacker by supplying a specially crafted yaml document when parsed by the
application might result in remote code execution
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Ján Rusnačko changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Ján Rusnačko changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Vincent Danen changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Vincent Danen changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Depends On||1165358
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Depends On||1161460
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Depends On||1160976
--
You are receiving this ma
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Depends On||1159403
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Marianne Feifer changed:
What|Removed |Added
CC|mfei...@redhat.com |
Kurt Seifried changed:
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Kurt Seifried changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #38 from errata-xmlrpc ---
This issue has been addressed in following products:
Red Hat Common for RHEL 6
Via RHSA-2014:0415 https://rhn.redhat.com/errata/RHSA-2014-0415.html
--
You are receiving this mail because:
You are on
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #37 from Fedora Update System ---
libyaml-0.1.2-7.el5 has been pushed to the Fedora EPEL 5 stable repository. If
problems still persist, please make note of it in this bug report.
--
You are receiving this mail because:
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #36 from Fedora Update System ---
libyaml-0.1.6-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If
problems still persist, please make note of it in this bug report.
--
You are receiving this mail because:
You are
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Bug 1078083 depends on bug 1081856, which changed state.
Bug 1081856 Summary: CVE-2014-2525 libyaml: heap-based buffer overflow when
parsing URLs [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1081856
What|Removed
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #35 from Fedora Update System ---
perl-YAML-LibYAML-0.38-4.el6 has been pushed to the Fedora EPEL 6 stable
repository. If problems still persist, please make note of it in this bug
report.
--
You are receiving this mail because:
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Bug 1078083 depends on bug 1081383, which changed state.
Bug 1081383 Summary: CVE-2014-2525 perl-YAML-LibYAML: libyaml: heap-based
buffer overflow when parsing URLs [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1081383
What
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #34 from Fedora Update System ---
perl-YAML-LibYAML-0.41-4.fc19 has been pushed to the Fedora 19 stable
repository. If problems still persist, please make note of it in this bug
report.
--
You are receiving this mail because:
Yo
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #33 from Fedora Update System ---
perl-YAML-LibYAML-0.41-4.fc20 has been pushed to the Fedora 20 stable
repository. If problems still persist, please make note of it in this bug
report.
--
You are receiving this mail because:
Yo
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Bug 1078083 depends on bug 1081382, which changed state.
Bug 1081382 Summary: CVE-2014-2525 perl-YAML-LibYAML: libyaml: heap-based
buffer overflow when parsing URLs [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1081382
Wha
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #32 from Fedora Update System ---
libyaml-0.1.6-1.fc19 has been pushed to the Fedora 19 stable repository. If
problems still persist, please make note of it in this bug report.
--
You are receiving this mail because:
You are on
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #31 from Fedora Update System ---
libyaml-0.1.6-1.fc20 has been pushed to the Fedora 20 stable repository. If
problems still persist, please make note of it in this bug report.
--
You are receiving this mail because:
You are on
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Bug 1078083 depends on bug 1081281, which changed state.
Bug 1081281 Summary: CVE-2014-2525 libyaml: heap-based buffer overflow when
parsing URLs [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1081281
What|Removed
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #30 from errata-xmlrpc ---
This issue has been addressed in following products:
OpenStack 3 for RHEL 6
Via RHSA-2014:0364 https://rhn.redhat.com/errata/RHSA-2014-0364.html
--
You are receiving this mail because:
You are on th
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #29 from errata-xmlrpc ---
This issue has been addressed in following products:
OpenStack 3 for RHEL 6
Via RHSA-2014:0353 https://rhn.redhat.com/errata/RHSA-2014-0353.html
--
You are receiving this mail because:
You are on th
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #28 from errata-xmlrpc ---
This issue has been addressed in following products:
OpenStack 4 for RHEL 6
Via RHSA-2014:0354 https://rhn.redhat.com/errata/RHSA-2014-0354.html
--
You are receiving this mail because:
You are on th
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #27 from errata-xmlrpc ---
This issue has been addressed in following products:
Red Hat Software Collections for RHEL-6
Via RHSA-2014:0355 https://rhn.redhat.com/errata/RHSA-2014-0355.html
--
You are receiving this mail becau
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Tomas Hoger changed:
What|Removed |Added
Depends On||1083710
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Tomas Hoger changed:
What|Removed |Added
Whiteboard|impact=important,public=201 |impact=important,public=201
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #24 from Murray McAllister ---
(In reply to John Eckersberg from comment #22)
> Can you please create a tracking bug for epel-all as well?
Done. Sorry about that!
--
You are receiving this mail because:
You are on the CC list fo
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Murray McAllister changed:
What|Removed |Added
Depends On||1081856
--- Comment #23 from Murr
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
--- Comment #22 from John Eckersberg ---
Can you please create a tracking bug for epel-all as well?
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug
https://bugzilla.redhat.com/token.cgi?
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Murray McAllister changed:
What|Removed |Added
Depends On||1081382
Depends On|
https://bugzilla.redhat.com/show_bug.cgi?id=1078083
Murray McAllister changed:
What|Removed |Added
CC||bgoll...@redhat.com,
37 matches
Mail list logo