https://bugzilla.redhat.com/show_bug.cgi?id=1281756

Adam Mariš <ama...@redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Depends On|                            |1281757
         Depends On|                            |1281758
         Depends On|                            |1281759
         Depends On|                            |1281760



--- Comment #1 from Adam Mariš <ama...@redhat.com> ---

Created libpng tracking bugs for this issue:

Affects: fedora-all [bug 1281757]


Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1281757
[Bug 1281757] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in
png_get_PLTE/png_set_PLTE functions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1281758
[Bug 1281758] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1281759
[Bug 1281759] CVE-2015-8126 libpng10: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1281760
[Bug 1281760] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7]
-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug 
https://bugzilla.redhat.com/token.cgi?t=pjERsi2qcI&a=cc_unsubscribe
_______________________________________________
mingw mailing list
mingw@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/mingw

Reply via email to