Overview

Request 546296 accepted

- U_Avoid-heap-overflows-due-to-integer-overflow-signedn.patch
* It is possible to trigger heap overflows due to an integer
overflow while parsing images and a signedness issue while
parsing comments. [CVE-2017-16612] (bsc#1065386)

Loading...
Request History
Stefan Dirsch's avatar

sndirsch created request

- U_Avoid-heap-overflows-due-to-integer-overflow-signedn.patch
* It is possible to trigger heap overflows due to an integer
overflow while parsing images and a signedness issue while
parsing comments. [CVE-2017-16612] (bsc#1065386)


Factory Auto's avatar

factory-auto added opensuse-review-team as a reviewer

Please review sources


Factory Auto's avatar

factory-auto added repo-checker as a reviewer

Please review build success


Factory Auto's avatar

factory-auto accepted review

Check script succeeded


Saul Goodman's avatar

licensedigger accepted review

ok


Staging Bot's avatar

staging-bot set openSUSE:Factory:Staging:G as a staging project

Being evaluated by staging project "openSUSE:Factory:Staging:G"


Staging Bot's avatar

staging-bot accepted review

Picked openSUSE:Factory:Staging:G


Ismail Dönmez's avatar

namtrac accepted review

lgtm


Repo Checker's avatar

repo-checker accepted review

cycle and install check passed


Dominique Leuenberger's avatar

dimstar_suse accepted review

ready to accept


Dominique Leuenberger's avatar

dimstar_suse approved review

ready to accept


Dominique Leuenberger's avatar

dimstar_suse accepted request

Accept to openSUSE:Factory

openSUSE Build Service is sponsored by