From mboxrd@z Thu Jan 1 00:00:00 1970 From: Leo Famulari Subject: [PATCH 0/1] libpng security update (CVE-2015-8126) Date: Sat, 14 Nov 2015 19:12:54 -0500 Message-ID: Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:54854) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZxkwO-0002Yl-Cq for guix-devel@gnu.org; Sat, 14 Nov 2015 19:13:09 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ZxkwI-0000yw-W9 for guix-devel@gnu.org; Sat, 14 Nov 2015 19:13:07 -0500 Received: from out5-smtp.messagingengine.com ([66.111.4.29]:39095) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ZxkwI-0000yj-Rd for guix-devel@gnu.org; Sat, 14 Nov 2015 19:13:02 -0500 Received: from jasmine.lan (c-69-249-5-231.hsd1.pa.comcast.net [69.249.5.231]) by mail.messagingengine.com (Postfix) with ESMTPA id 2486A680140 for ; Sat, 14 Nov 2015 19:12:58 -0500 (EST) List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org To: guix-devel@gnu.org These buffer overflows in libpng were announced today: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8126 This patch updates libpng to 1.5.24, which is claimed to be free of the bugs. Leo Famulari (1): gnu: libpng: Add fixes for CVE-2015-8126. gnu/packages/image.scm | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) -- 2.6.2