——————————————————————————–
Fedora Update Notification
FEDORA-2015-8a1243db75
2015-11-28 18:54:08.261703
——————————————————————————–
Name : mingw-libpng
Product : Fedora 21
Version : 1.6.19
Release : 1.fc21
URL : http://www.libpng.org/pub/png/
Summary : MinGW Windows Libpng library
Description :
MinGW Windows Libpng library.
——————————————————————————–
Update Information:
libpng 1.6.19 release, fixing CVE-2015-8126
——————————————————————————–
References:
[ 1 ] Bug #1281756 – CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
——————————————————————————–
This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-libpng’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
——————————————————————————–
Fedora Update Notification
FEDORA-2015-13668fff74
2015-11-27 16:47:54.519073
——————————————————————————–
Name : mingw-libpng
Product : Fedora 23
Version : 1.6.19
Release : 1.fc23
URL : http://www.libpng.org/pub/png/
Summary : MinGW Windows Libpng library
Description :
MinGW Windows Libpng library.
——————————————————————————–
Update Information:
libpng 1.6.19 release, fixing CVE-2015-8126
——————————————————————————–
References:
[ 1 ] Bug #1281756 – CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
——————————————————————————–
This update can be installed with the “yum” update program. Use
su -c ‘yum update mingw-libpng’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-97fc1797fa
2015-11-27 16:47:02.532586
--------------------------------------------------------------------------------
Name : mingw-libpng
Product : Fedora 22
Version : 1.6.19
Release : 1.fc22
URL : http://www.libpng.org/pub/png/
Summary : MinGW Windows Libpng library
Description :
MinGW Windows Libpng library.
--------------------------------------------------------------------------------
Update Information:
libpng 1.6.19 release, fixing CVE-2015-8126
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1281756 - CVE-2015-8126 libpng: Buffer overflow vulnerabilities in png_get_PLTE/png_set_PLTE functions
https://bugzilla.redhat.com/show_bug.cgi?id=1281756
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update mingw-libpng' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
$downloadlink = get_field('download_link'); ?>



