https://bugzilla.redhat.com/show_bug.cgi?id=1281756
Adam Mariš <ama...@redhat.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Depends On| |1281757 Depends On| |1281758 Depends On| |1281759 Depends On| |1281760 --- Comment #1 from Adam Mariš <ama...@redhat.com> --- Created libpng tracking bugs for this issue: Affects: fedora-all [bug 1281757] Referenced Bugs: https://bugzilla.redhat.com/show_bug.cgi?id=1281757 [Bug 1281757] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1281758 [Bug 1281758] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1281759 [Bug 1281759] CVE-2015-8126 libpng10: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-6] https://bugzilla.redhat.com/show_bug.cgi?id=1281760 [Bug 1281760] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7] -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=pjERsi2qcI&a=cc_unsubscribe _______________________________________________ mingw mailing list mingw@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/mingw