https://bugzilla.redhat.com/show_bug.cgi?id=1037975

Huzaifa S. Sidhpurwala <huzai...@redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Whiteboard|impact=moderate,public=2013 |impact=important,public=201
                   |0716,reported=20131204,sour |30716,reported=20131204,sou
                   |ce=osssec,cvss2=5.0/AV:N/AC |rce=osssec,cvss2=6.8/AV:N/A
                   |:L/Au:N/C:N/I:N/A:P,fedora- |C:M/Au:N/C:P/I:P/A:P,fedora
                   |all/pixman=affected,fedora- |-all/pixman=affected,fedora
                   |all/mingw-pixman=affected,e |-all/mingw-pixman=affected,
                   |pel-5/mingw32-pixman=affect |epel-5/mingw32-pixman=affec
                   |ed,rhel-5/pixman=affected,r |ted,rhel-5/pixman=affected,
                   |hel-6/pixman=affected,rhel- |rhel-6/pixman=affected,rhel
                   |7/pixman=affected           |-7/pixman=affected



--- Comment #6 from Huzaifa S. Sidhpurwala <huzai...@redhat.com> ---
After closer investigation of this issue, it seems that arbitrary code
execution via user controlled data may be possible in this particular flaw.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=AiJnRWnJfH&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to