[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[Bug 159469] New: Arbitrary code execution update

Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.


           Summary: Arbitrary code execution update
           Product: Fedora Extras
           Version: devel
          Platform: All
               URL: http://lwn.net/Vulnerabilities/136867/
        OS/Version: Linux
            Status: NEW
          Severity: security
          Priority: normal
         Component: perl-Convert-UUlib
        AssignedTo: Nicolas Mailhot laPoste net
        ReportedBy: Nicolas Mailhot laPoste net
         QAContact: extras-qa fedoraproject org
                CC: fedora-perl-devel-list redhat com

This is an update (mainly version bump) of the perl-Convert-UUlib I 
contributed to fedora.us. No big spec changes.

I'm listed as the perl-Convert-UUlib owner in bugzilla but since I'v 
only just completed the https://admin.fedora.redhat.com/accounts/ I 
haven't got the faintest idea of what's still required before this can 
hit the Extras CVS (reviews, sponsors, etc)


Packages (built on Fedora Devel):




Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.

[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]