Product: Fedora EPEL
https://bugzilla.redhat.com/show_bug.cgi?id=889716
Bug ID: 889716
Summary: pthread header files are installed not to the root of
"include" directory
Product: Fedora EPEL
Version: el5
Component: mingw32-pthreads
Severity: low
Priority: unspecified
Reporter: max.salov(a)gmail.com
Description of problem:
Header files are installed into
/usr/i686-pc-mingw32/sys-root/mingw/include/pthread/ directory instead of
/usr/i686-pc-mingw32/sys-root/mingw/include/. As a result pthread.h header file
is not accessible with #include <pthread.h> directive.
If use #include <pthread/pthread.h>, other headers from pthread library are not
found during compilation process, because are included without directory prefix
(e.g. #include <sched.h>, not #include <pthread/sched.h>).
The only way to use mingw32-pthread I see is to add
-I/usr/i686-pc-mingw32/sys-root/mingw/include/pthread/ to CFLAGS and use
#include <pthread.h> directive.
Version-Release number of selected component (if applicable):
2.8.0-4.el5
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=8vnwgOGS8H&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1056860
Bug ID: 1056860
Summary: CVE-2013-6954 mingw32-libpng: libpng: unhandled
zero-length PLTE chunk or NULL palette [epel-all]
Product: Fedora EPEL
Version: el6
Component: mingw32-libpng
Keywords: Security, SecurityTracking
Severity: medium
Priority: medium
Assignee: rjones(a)redhat.com
Reporter: huzaifas(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: drizt(a)land.ru, fedora-mingw(a)lists.fedoraproject.org,
ktietz(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com
Blocks: 1045561 (CVE-2013-6954)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
Please note: this issue affects multiple supported versions of Fedora EPEL.
Only one tracking bug has been filed; please ensure that it is only closed
when all affected versions are fixed.
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1045561
[Bug 1045561] CVE-2013-6954 libpng: unhandled zero-length PLTE chunk or
NULL palette
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=VN68ejWjZh&a=cc_unsubscribe
https://bugzilla.redhat.com/show_bug.cgi?id=1043745
Bug ID: 1043745
Summary: CVE-2013-6425 mingw32-pixman: pixman: integer
underflow when handling trapezoids [epel-5]
Product: Fedora EPEL
Version: el5
Component: mingw32-pixman
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: rjones(a)redhat.com
Reporter: huzaifas(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: fedora-mingw(a)lists.fedoraproject.org,
kraxel(a)redhat.com, lfarkas(a)lfarkas.org,
rjones(a)redhat.com
Blocks: 1037975 (CVE-2013-6425)
This is an automatically created tracking bug! It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of Fedora EPEL.
For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.
For more information see:
http://fedoraproject.org/wiki/Security/TrackingBugs
When creating a Bodhi update request, please use the bodhi submission link
noted in the next comment(s). This will include the bug IDs of this
tracking bug as well as the relevant top-level CVE bugs.
Please also mention the CVE IDs being fixed in the RPM changelog and the
Bodhi notes field when available.
epel-5 tracking bug for mingw32-pixman: see blocks bug list for full details of
the security issue(s).
[bug automatically created by: add-tracking-bugs]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1037975
[Bug 1037975] CVE-2013-6425 pixman: integer underflow when handling
trapezoids
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=dUydcKwZkZ&a=cc_unsubscribe