** Changed in: libpng (Ubuntu Precise)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflo
Thanks Marc!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Status in libpng package in Ubuntu:
Fix Released
Stat
This bug was fixed in the package libpng - 1.2.46-3ubuntu4.1
---
libpng (1.2.46-3ubuntu4.1) precise-security; urgency=medium
[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- debian/patch
** Changed in: libpng (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.10.1
---
libpng (1.2.51-0ubuntu3.15.10.1) wily-security; urgency=medium
[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- deb
This bug was fixed in the package libpng - 1.2.50-1ubuntu2.14.04.1
---
libpng (1.2.50-1ubuntu2.14.04.1) trusty-security; urgency=medium
[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- d
This bug was fixed in the package libpng - 1.2.51-0ubuntu3.15.04.1
---
libpng (1.2.51-0ubuntu3.15.04.1) vivid-security; urgency=medium
[ Andrew Starr-Bochicchio ]
* SECURITY UPDATE: Multiple buffer overflows in the (1) png_set_PLTE
and (2) png_get_PLTE (LP: #1516592).
- de
Thanks for the debdiffs, building now for a security update!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Status
** Also affects: libpng (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple b
** Changed in: libpng (Ubuntu)
Importance: Undecided => High
** Changed in: libpng (Ubuntu Trusty)
Importance: Undecided => High
** Changed in: libpng (Ubuntu Vivid)
Importance: Undecided => High
** Changed in: libpng (Ubuntu Wily)
Importance: Undecided => High
** Tags added: patch
** Also affects: libpng (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: libpng (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: libpng (Ubuntu Vivid)
Importance: Undecided
Status: New
--
You received this bug notification because
All of the above have been test build successfully with pbuilder for
their respective releases. There doesn't seem to be any public POC
yet...
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.laun
debdiff for 15.10 security update
** Patch added: "libpng_1.2.51-0ubuntu3.15.10.1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+attachment/4521639/+files/libpng_1.2.51-0ubuntu3.15.10.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
debdiff for 14.04 security update
** Patch added: "libpng_1.2.50-1ubuntu2.14.04.1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+attachment/4521641/+files/libpng_1.2.50-1ubuntu2.14.04.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
debdiff for 15.04 security update
** Patch added: "libpng_1.2.51-0ubuntu3.15.04.1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+attachment/4521640/+files/libpng_1.2.51-0ubuntu3.15.04.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Debdiff for xenial incorporating the above upstream commits.
Successfully builds in a clean xenial pbuilder.
** Patch added: "libpng_1.2.51-0ubuntu4.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libpng/+bug/1516592/+attachment/4521636/+files/libpng_1.2.51-0ubuntu4.debdiff
--
You receive
** Summary changed:
- Multiple buffer overflows
+ CVE-2015-8126: Multiple buffer overflows
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Mul
17 matches
Mail list logo