Bug 1410125
Summary: | CVE-2016-10092 CVE-2016-10093 CVE-2016-10094 CVE-2016-10095 CVE-2017-5225 CVE-2017-5563 mingw-libtiff: various flaws [epel-7] | ||
---|---|---|---|
Product: | [Fedora] Fedora EPEL | Reporter: | Adam Mariš <amaris> |
Component: | mingw-libtiff | Assignee: | Erik van Pienbroek <erik-fedora> |
Status: | CLOSED EOL | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | epel7 | CC: | erik-fedora |
Target Milestone: | --- | Keywords: | Security, SecurityTracking |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Release Note | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-02-13 11:57:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1410063, 1410067, 1410116, 1410119, 1412716, 1416109 |
Description
Adam Mariš
2017-01-04 14:19:18 UTC
Use the following template to for the 'fedpkg update' request to submit an update for this issue as it contains the top-level parent bug(s) as well as this tracking bug. This will ensure that all associated bugs get updated when new packages are pushed to stable. ===== # bugfix, security, enhancement, newpackage (required) type=security # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1410119,1410116,1410067,1410063,1410125 # Description of your update notes=Security fix for CVE-2016-10094, CVE-2016-10093, CVE-2016-10092, CVE-2016-10095 # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Additionally, you may opt to use the bodhi web interface to submit updates: https://bodhi.fedoraproject.org/updates/new Adding parent bug 1412716 (for CVE-2017-5225). Please use this new fedpkg update template when submitting the update: ===== # bugfix, security, enhancement, newpackage (required) type=security # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1410125,1410063,1410067,1410116,1410119,1412716 # Description of your update notes=Security fix for CVE-2016-10095, CVE-2016-10092, CVE-2016-10093, CVE-2016-10094, CVE-2017-5225 # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== Adding parent bug 1416109 (for CVE-2017-5563). Please use this new fedpkg update template when submitting the update: ===== # bugfix, security, enhancement, newpackage (required) type=security # testing, stable request=testing # Bug numbers: 1234,9876 bugs=1410125,1410063,1410067,1410116,1410119,1412716,1416109 # Description of your update notes=Security fix for CVE-2016-10095, CVE-2016-10092, CVE-2016-10093, CVE-2016-10094, CVE-2017-5225, CVE-2017-5563 # Enable request automation based on the stable/unstable karma thresholds autokarma=True stable_karma=3 unstable_karma=-3 # Automatically close bugs when this marked as stable close_bugs=True # Suggest that users restart after update suggest_reboot=False ====== All mingw-* EPEL 7 components have been retired. Please see: https://pagure.io/fesco/issue/2333 Therefore this bug no longer applies and is being mass closed. |