https://bugzilla.redhat.com/show_bug.cgi?id=1281756
Adam Mariš <amaris(a)redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Depends On| |1281757
Depends On| |1281758
Depends On| |1281759
Depends On| |1281760
--- Comment #1 from Adam Mariš <amaris(a)redhat.com> ---
Created libpng tracking bugs for this issue:
Affects: fedora-all [bug 1281757]
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=1281757
[Bug 1281757] CVE-2015-8126 libpng: Buffer overflow vulnerabilities in
png_get_PLTE/png_set_PLTE functions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1281758
[Bug 1281758] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1281759
[Bug 1281759] CVE-2015-8126 libpng10: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-6]
https://bugzilla.redhat.com/show_bug.cgi?id=1281760
[Bug 1281760] CVE-2015-8126 mingw-libpng: libpng: Buffer overflow
vulnerabilities in png_get_PLTE/png_set_PLTE functions [epel-7]
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug
https://bugzilla.redhat.com/token.cgi?t=pjERsi2qcI&a=cc_unsubscribe