Please do not reply directly to this email. All additional comments should be made in the comments box of this bug report. https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159469 Summary: Arbitrary code execution update Product: Fedora Extras Version: devel Platform: All URL: http://lwn.net/Vulnerabilities/136867/ OS/Version: Linux Status: NEW Severity: security Priority: normal Component: perl-Convert-UUlib AssignedTo: Nicolas.Mailhot@xxxxxxxxxxx ReportedBy: Nicolas.Mailhot@xxxxxxxxxxx QAContact: extras-qa@xxxxxxxxxxxxxxxxx CC: fedora-perl-devel-list@xxxxxxxxxx This is an update (mainly version bump) of the perl-Convert-UUlib I contributed to fedora.us. No big spec changes. I'm listed as the perl-Convert-UUlib owner in bugzilla but since I'v only just completed the https://admin.fedora.redhat.com/accounts/ I haven't got the faintest idea of what's still required before this can hit the Extras CVS (reviews, sponsors, etc) Source: http://mapage.noos.fr/nmailhot/fedora/perl-Convert-UUlib-1.051-1.src.rpm Packages (built on Fedora Devel): http://mapage.noos.fr/nmailhot/fedora/perl-Convert-UUlib-1.051-1.i386.rpm http://mapage.noos.fr/nmailhot/fedora/perl-Convert-UUlib-debuginfo-1.051-1.i386.rpm Sums: http://mapage.noos.fr/nmailhot/fedora/perl-Convert-UUlib-md5sums.asc http://mapage.noos.fr/nmailhot/fedora/perl-Convert-UUlib-sha1sums.asc -- Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.