https://bugzilla.redhat.com/show_bug.cgi?id=1037975
Huzaifa S. Sidhpurwala <huzai...@redhat.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard|impact=moderate,public=2013 |impact=important,public=201 |0716,reported=20131204,sour |30716,reported=20131204,sou |ce=osssec,cvss2=5.0/AV:N/AC |rce=osssec,cvss2=6.8/AV:N/A |:L/Au:N/C:N/I:N/A:P,fedora- |C:M/Au:N/C:P/I:P/A:P,fedora |all/pixman=affected,fedora- |-all/pixman=affected,fedora |all/mingw-pixman=affected,e |-all/mingw-pixman=affected, |pel-5/mingw32-pixman=affect |epel-5/mingw32-pixman=affec |ed,rhel-5/pixman=affected,r |ted,rhel-5/pixman=affected, |hel-6/pixman=affected,rhel- |rhel-6/pixman=affected,rhel |7/pixman=affected |-7/pixman=affected --- Comment #6 from Huzaifa S. Sidhpurwala <huzai...@redhat.com> --- After closer investigation of this issue, it seems that arbitrary code execution via user controlled data may be possible in this particular flaw. -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=AiJnRWnJfH&a=cc_unsubscribe _______________________________________________ mingw mailing list mingw@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/mingw