Fedora 19 updates-testing report

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The following Fedora 19 Security updates need testing:
 Age  URL
 419  https://admin.fedoraproject.org/updates/FEDORA-2013-19963/openstack-glance-2013.1.4-1.fc19
  77  https://admin.fedoraproject.org/updates/FEDORA-2014-12057/krb5-1.11.3-29.fc19
  53  https://admin.fedoraproject.org/updates/FEDORA-2014-13551/wpa_supplicant-2.0-12.fc19
  44  https://admin.fedoraproject.org/updates/FEDORA-2014-14237/claws-mail-plugins-3.11.1-1.fc19,claws-mail-3.11.1-2.fc19,libetpan-1.6-1.fc19
  37  https://admin.fedoraproject.org/updates/FEDORA-2014-14738/gnutls-3.1.20-6.fc19
  35  https://admin.fedoraproject.org/updates/FEDORA-2014-12407/sddm-0.10.0-2.fc19
  31  https://admin.fedoraproject.org/updates/FEDORA-2014-15248/kde-runtime-4.11.5-3.fc19
  30  https://admin.fedoraproject.org/updates/FEDORA-2014-15378/rubygem-actionpack-3.2.13-7.fc19
  28  https://admin.fedoraproject.org/updates/FEDORA-2014-15466/rubygem-sprockets-2.8.2-4.fc19
  24  https://admin.fedoraproject.org/updates/FEDORA-2014-15740/facter-1.6.18-8.fc19
  17  https://admin.fedoraproject.org/updates/FEDORA-2014-15999/libreoffice-4.1.6.2-10.fc19
  17  https://admin.fedoraproject.org/updates/FEDORA-2014-16045/util-linux-2.23.2-6.fc19
  12  https://admin.fedoraproject.org/updates/FEDORA-2014-16485/pam-1.1.6-13.fc19
  12  https://admin.fedoraproject.org/updates/FEDORA-2014-16479/python3-3.3.2-11.fc19
  12  https://admin.fedoraproject.org/updates/FEDORA-2014-16466/pyxdg-0.25-5.fc19
   7  https://admin.fedoraproject.org/updates/FEDORA-2014-16576/bind-9.9.3-16.P2.fc19
   7  https://admin.fedoraproject.org/updates/FEDORA-2014-16690/curl-7.29.0-27.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16896/tcpdump-4.4.0-5.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16874/asterisk-11.14.2-1.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16728/xorg-x11-server-1.14.4-5.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16865/docker-io-1.4.0-1.fc19
   2  https://admin.fedoraproject.org/updates/FEDORA-2014-17053/openjpeg-1.5.1-13.fc19
   2  https://admin.fedoraproject.org/updates/FEDORA-2014-17081/denyhosts-2.6-28.fc19.1
   1  https://admin.fedoraproject.org/updates/FEDORA-2014-16826/nss-3.17.3-2.fc19,nss-util-3.17.3-1.fc19,nss-softokn-3.17.3-1.fc19
   1  https://admin.fedoraproject.org/updates/FEDORA-2014-17110/mariadb-5.5.40-2.fc19
   1  https://admin.fedoraproject.org/updates/FEDORA-2014-17210/ettercap-0.8.1-2.fc19
   1  https://admin.fedoraproject.org/updates/FEDORA-2014-17217/seamonkey-2.31-1.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17277/mailx-12.5-9.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-16465/jasper-1.900.1-26.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17244/kernel-3.14.27-100.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17264/mediawiki-1.23.8-1.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17270/mingw-jasper-1.900.1-25.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17276/php-5.5.20-2.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17284/ca-certificates-2014.2.2-1.0.fc19


The following Fedora 19 Critical Path updates have yet to be approved:
 Age URL
 367  https://admin.fedoraproject.org/updates/FEDORA-2013-22326/fedora-bookmarks-15-5.fc19
 293  https://admin.fedoraproject.org/updates/FEDORA-2014-3245/testdisk-6.14-2.fc19.1,ntfs-3g-2014.2.15-1.fc19
  12  https://admin.fedoraproject.org/updates/FEDORA-2014-16485/pam-1.1.6-13.fc19
  12  https://admin.fedoraproject.org/updates/FEDORA-2014-16466/pyxdg-0.25-5.fc19
   7  https://admin.fedoraproject.org/updates/FEDORA-2014-16576/bind-9.9.3-16.P2.fc19
   7  https://admin.fedoraproject.org/updates/FEDORA-2014-16770/hicolor-icon-theme-0.14-1.fc19
   7  https://admin.fedoraproject.org/updates/FEDORA-2014-16690/curl-7.29.0-27.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16892/poppler-0.22.1-7.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16866/perl-Filter-1.51-1.fc19
   6  https://admin.fedoraproject.org/updates/FEDORA-2014-16728/xorg-x11-server-1.14.4-5.fc19
   2  https://admin.fedoraproject.org/updates/FEDORA-2014-17053/openjpeg-1.5.1-13.fc19
   1  https://admin.fedoraproject.org/updates/FEDORA-2014-16826/nss-3.17.3-2.fc19,nss-util-3.17.3-1.fc19,nss-softokn-3.17.3-1.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17244/kernel-3.14.27-100.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-17284/ca-certificates-2014.2.2-1.0.fc19
   0  https://admin.fedoraproject.org/updates/FEDORA-2014-16465/jasper-1.900.1-26.fc19


The following builds have been pushed to Fedora 19 updates-testing

    ca-certificates-2014.2.2-1.0.fc19
    deluge-1.3.11-1.fc19
    fedmsg-notify-0.5.5-1.fc19
    gnome-contacts-3.8.4-1.fc19
    jasper-1.900.1-26.fc19
    kernel-3.14.27-100.fc19
    mailx-12.5-9.fc19
    mediawiki-1.23.8-1.fc19
    mingw-jasper-1.900.1-25.fc19
    perl-MCE-1.521-1.fc19
    php-5.5.20-2.fc19
    python-mutagen-1.27-1.fc19
    zint-2.4.3-9.fc19

Details about builds:


================================================================================
 ca-certificates-2014.2.2-1.0.fc19 (FEDORA-2014-17284)
 The Mozilla CA root certificate bundle
--------------------------------------------------------------------------------
Update Information:

This is an update to the set of CA certificates released with NSS version 3.17.3

However, the package modifies the CA list to keep several legacy CAs still trusted for compatibility reasons. Please refer to the project URL for details.

If you prefer to use the unchanged list provided by Mozilla, and if you accept any compatibility issues it may cause, an administrator may configure the system by executing the "ca-legacy disable" command.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Dec 16 2014 Kai Engert <kaie@xxxxxxxxxx> - 2014.2.2-1.0
- Update to CKBI 2.2 from NSS 3.17.3 with legacy modifications
- Update project URL
--------------------------------------------------------------------------------


================================================================================
 deluge-1.3.11-1.fc19 (FEDORA-2014-17235)
 A GTK+ BitTorrent client with support for DHT, UPnP, and PEX
--------------------------------------------------------------------------------
Update Information:

Update to 1.3.11\r\n\r\nGtkUI\r\n\r\n    Fixed ImportError? for users with Twisted < 10\r\n    #2698: Fixed column issue when disabling a plugin \r\n\r\nCore\r\n\r\n    Fixed cache issue with libtorrent 0.16 on Windows\r\n    #2555: Disabled use of SSLv3 protocol for DelugeRPC \r\n\r\nWebUI\r\n\r\n    Modify SSL Context to allow >= TLSv1 protocol\r\n    #2588: Fixed Size column to show total_wanted instead of total_size \nupdate to 1.3.10
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Tom Callaway <spot@xxxxxxxxxxxxxxxxx> - 1.3.11-1
- update to 1.3.11
* Thu Oct 16 2014 Rahul Sundaram <sundaram@xxxxxxxxxxxxxxxxx> - 1.3.10-1
- update to 1.3.10
* Mon Oct  6 2014 Rahul Sundaram <sundaram@xxxxxxxxxxxxxxxxx> - 1.3.9-1
- upstream release 1.3.9
- http://dev.deluge-torrent.org/wiki/ReleaseNotes/1.3.9
- switch to bz2
- remove empty file
- drop old obsoletes and provides
- drop old sysv transitional changes
- switch from using systemd-units to systemd
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1153456 - deluge-web is vulnerable to POODLE
        https://bugzilla.redhat.com/show_bug.cgi?id=1153456
--------------------------------------------------------------------------------


================================================================================
 fedmsg-notify-0.5.5-1.fc19 (FEDORA-2014-17262)
 Fedmsg Desktop Notifications
--------------------------------------------------------------------------------
Update Information:

 * Make the topic grid scrollable
 * Fixed the distro-specific imports
 * Uses the abrt python API


--------------------------------------------------------------------------------
ChangeLog:

* Wed Dec 17 2014 Luke Macken <lmacken@xxxxxxxxxx> - 0.5.5-1
- Latest upstream release
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 0.5.4-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Thu Jan  9 2014 Luke Macken <lmacken@xxxxxxxxxx> - 0.5.4-1
- Update to 0.5.4 upstream release
* Fri Dec  6 2013 Pierre-Yves Chibon <pingou@pingoured>fr - 0.5.3-2
- Change BR from python-setuptools-devel to python-setuptools
  See https://fedoraproject.org/wiki/Changes/Remove_Python-setuptools-devel
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1087076 - Fedmsg-notify height windows is not resizable.
        https://bugzilla.redhat.com/show_bug.cgi?id=1087076
--------------------------------------------------------------------------------


================================================================================
 gnome-contacts-3.8.4-1.fc19 (FEDORA-2014-17265)
 Contacts manager for GNOME
--------------------------------------------------------------------------------
Update Information:

Update to 3.8.4
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 David King <amigadave@xxxxxxxxxxxxx> - 3.8.4-1
- Update to 3.8.4
--------------------------------------------------------------------------------


================================================================================
 jasper-1.900.1-26.fc19 (FEDORA-2014-16465)
 Implementation of the JPEG-2000 standard, Part 1
--------------------------------------------------------------------------------
Update Information:

Fixes various flaws: CVE-2014-9029, CVE-2014-8138, CVE-2014-8137
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Jiri Popelka <jpopelka@xxxxxxxxxx> - 1.900.1-26
- CVE-2014-8137 - double-free in jas_iccattrval_destroy() (oCERT-2014-012) (#1175761)
- CVE-2014-8138 - heap overflow in jp2_decode() (oCERT-2014-012) (#1175761)
* Thu Dec  4 2014 Jiri Popelka <jpopelka@xxxxxxxxxx> - 1.900.1-25
- CVE-2014-9029 - incorrect component number check in COC, RGN and QCC
                  marker segment decoders (#1170650)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1167537 - CVE-2014-9029 jasper: incorrect component number check in COC, RGN and QCC marker segment decoders (oCERT-2014-009)
        https://bugzilla.redhat.com/show_bug.cgi?id=1167537
  [ 2 ] Bug #1173157 - CVE-2014-8137 jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012)
        https://bugzilla.redhat.com/show_bug.cgi?id=1173157
  [ 3 ] Bug #1173162 - CVE-2014-8138 jasper: heap overflow in jp2_decode() (oCERT-2014-012)
        https://bugzilla.redhat.com/show_bug.cgi?id=1173162
--------------------------------------------------------------------------------


================================================================================
 kernel-3.14.27-100.fc19 (FEDORA-2014-17244)
 The Linux kernel
--------------------------------------------------------------------------------
Update Information:

The 3.14.27 stable update contains a number of important fixes across the tree.\nThe 3.14.26 update contains a number of important fixes across the tree\nThe 3.14.25 stable update contains a number of important fixes across the tree.\nThe 3.14.24 stable update contains a number of important fixes across the tree.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Dec 17 2014 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> - 3.14.27-100
- Linux v3.14.27
* Wed Dec 10 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- CVE-2014-8134 fix espfix for 32-bit KVM paravirt guests (rhbz 1172765 1172769)
* Mon Dec  8 2014 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> - 3.14.26-100
- Linux v3.14.26
* Thu Dec  4 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- CVE-2014-9090 local DoS via do_double_fault due to improper SS faults (rhbz 1170691)
* Fri Nov 21 2014 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> - 3.14.25-100
- Linux v3.14.25
* Fri Nov 14 2014 Justin M. Forbes <jforbes@xxxxxxxxxxxxxxxxx> - 3.14.24-100
- Linux v3.14.24
* Thu Nov 13 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- CVE-2014-7842 kvm: reporting emulation failures to userspace (rhbz 1163762 1163767)
* Wed Nov 12 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- CVE-2014-7841 sctp: NULL ptr deref on malformed packet (rhbz 1163087 1163095)
* Fri Nov  7 2014 Josh Boyer <jwboyer@xxxxxxxxxxxxxxxxx>
- CVE-2014-7826 CVE-2014-7825 insufficient syscall number validation in perf and ftrace subsystems (rhbz 1161565 1161572)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1172765 - CVE-2014-8134 kernel: x86: espfix not working for 32-bit KVM paravirt guests
        https://bugzilla.redhat.com/show_bug.cgi?id=1172765
  [ 2 ] Bug #1170691 - CVE-2014-9090 kernel: espfix64: local DoS via do_double_fault() due to improper handling of faults associated with SS segment register
        https://bugzilla.redhat.com/show_bug.cgi?id=1170691
  [ 3 ] Bug #1163762 - CVE-2010-5313 CVE-2014-7842 kernel: kvm: reporting emulation failures to userspace
        https://bugzilla.redhat.com/show_bug.cgi?id=1163762
  [ 4 ] Bug #1163087 - CVE-2014-7841 kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
        https://bugzilla.redhat.com/show_bug.cgi?id=1163087
  [ 5 ] Bug #1161565 - CVE-2014-7825 CVE-2014-7826 kernel: insufficient syscall number validation in perf and ftrace subsystems
        https://bugzilla.redhat.com/show_bug.cgi?id=1161565
--------------------------------------------------------------------------------


================================================================================
 mailx-12.5-9.fc19 (FEDORA-2014-17277)
 Enhanced implementation of the mailx command
--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2004-2771, CVE-2014-7844
--------------------------------------------------------------------------------
ChangeLog:

* Wed Dec 17 2014 jchaloup <jchaloup@xxxxxxxxxx> - 12.5-9
- Security fix for CVE-2004-2771, CVE-2014-7844
  resolves: #1174903
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1162783 - CVE-2004-2771 CVE-2014-7844 mailx: command execution flaw
        https://bugzilla.redhat.com/show_bug.cgi?id=1162783
--------------------------------------------------------------------------------


================================================================================
 mediawiki-1.23.8-1.fc19 (FEDORA-2014-17264)
 A wiki engine
--------------------------------------------------------------------------------
Update Information:

* (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.\r\n* (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.\r\n* (bug T74222) The original patch for T74222 was reverted as unnecessary.\r\n
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Michael Cronenworth <mike@xxxxxxxxxx> - 1.23.8-1
- Update to 1.23.8
- (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which could lead to xss. Permission to edit MediaWiki namespace is required to exploit this.
- (bug T77028) [SECURITY] Malicious site can bypass CORS restrictions in $wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as part of its name.
- (bug T74222) The original patch for T74222 was reverted as unnecessary.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1175828 - mediawiki: multiple vulnerabilities
        https://bugzilla.redhat.com/show_bug.cgi?id=1175828
--------------------------------------------------------------------------------


================================================================================
 mingw-jasper-1.900.1-25.fc19 (FEDORA-2014-17270)
 MinGW Windows Jasper library
--------------------------------------------------------------------------------
Update Information:

Fixes for CVE-2014-8137 and CVE-2014-8138
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Michael Cronenworth <mike@xxxxxxxxxx> - 1.900.1-25
- Fixes for CVE-2014-8137 and CVE-2014-8138
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1173157 - CVE-2014-8137 jasper: double-free in in jas_iccattrval_destroy() (oCERT-2014-012)
        https://bugzilla.redhat.com/show_bug.cgi?id=1173157
  [ 2 ] Bug #1173162 - CVE-2014-8138 jasper: heap overflow in jp2_decode() (oCERT-2014-012)
        https://bugzilla.redhat.com/show_bug.cgi?id=1173162
--------------------------------------------------------------------------------


================================================================================
 perl-MCE-1.521-1.fc19 (FEDORA-2014-17275)
 Many-core Engine for Perl providing parallel processing capabilities
--------------------------------------------------------------------------------
Update Information:

Fixed broken MCE::Queue ->insert and ->peek methods. FIFO and LIFO are fully supported with this release.  Support running in taint mode.  Added support for negative index in MCE::Queue ->insert and ->peek.  Updated the documentation.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Dec 17 2014 Petr Šabata <contyk@xxxxxxxxxx> - 1.521-1
- 1.521 bump
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1175208 - perl-MCE-1.521 is available
        https://bugzilla.redhat.com/show_bug.cgi?id=1175208
--------------------------------------------------------------------------------


================================================================================
 php-5.5.20-2.fc19 (FEDORA-2014-17276)
 PHP scripting language for creating dynamic web sites
--------------------------------------------------------------------------------
Update Information:

18 Dec 2014, PHP 5.5.20\\r\\n\\r\\nCore:\\r\\n* Fixed bug #68091 (Some Zend headers lack appropriate extern "C" blocks). (Adam)\\r\\n* Fixed bug #68185 ("Inconsistent insteadof definition."- incorrectly  triggered). (Julien)\\r\\n* Fixed bug #68370 ("unset($this)" can make the program crash). (Laruence)\\r\\n* Fixed bug #68545 (NULL pointer dereference in unserialize.c). (Anatol)\\r\\n* Fixed bug #68594 (Use after free vulnerability in unserialize()). (CVE-2014-8142) (Stefan Esser)\\r\\n\\r\\nDate:\\r\\n* Fixed day_of_week function as it could sometimes return negative values internally. (Derick)\\r\\n\\r\\nFPM:\\r\\n* Fixed bug #68381 (fpm_unix_init_main ignores log_level). (David Zuelke, Remi)\\r\\n* Fixed bug #68420 (listen=9000 listens to ipv6 localhost instead of all addresses). (Remi)\\r\\n* Fixed bug #68421 (access.format='%R' doesn't log ipv6 address). (Remi)\\r\\n* Fixed bug #68423 (PHP-FPM will no longer load all pools). (Remi)\\r\\n* Fixed bug #68428 (listen.allowed_clients is IPv4 only). (Remi)\\r\\n* Fixed bug #68452 (php-fpm man page is oudated). (Remi)\\r\\n* Fixed request #68458 (Change pm.start_servers default warning to notice). (David Zuelke, Remi)\\r\\n* Fixed bug #68463 (listen.allowed_clients can silently result in no allowed access). (Remi)\\r\\n* Fixed request #68391 (php-fpm conf files loading order). (Florian Margaine, Remi)\\r\\n* Fixed bug #68478 (access.log don't use prefix). (Remi)\\r\\n\\r\\nMcrypt:\\r\\n* Fixed possible read after end of buffer and use after free. (Dmitry)\\r\\n\\r\\nPDO_pgsql:\\r\\n* Fixed bug #66584 (Segmentation fault on statement deallocation) (Matteo)\\r\\n* Fixed bug #67462 (PDO_PGSQL::beginTransaction() wrongly throws exception when not in transaction) (Matteo)\\r\\n* Fixed bug #68351 (PDO::PARAM_BOOL and ATTR_EMULATE_PREPARES misbehaving)\\r\\n  (Matteo)\\r\\n\\r\\nzlib:\\r\\n* Fixed bug #53829 (Compiling PHP with large file support will replace function gzopen by gzopen64) (Sascha Kettler, Matteo)
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> 5.5.20-2
- Update to 5.5.20 (real)
  http://www.php.net/releases/5_5_20.php
- php-xmlrpc requires php-xml
* Wed Dec 10 2014 Remi Collet <remi@xxxxxxxxxxxxxxxxx> 5.5.20-1
- Update to 5.5.20
  http://www.php.net/releases/5_5_20.php
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1175718 - CVE-2014-8142 php: use after free vulnerability in unserialize()
        https://bugzilla.redhat.com/show_bug.cgi?id=1175718
--------------------------------------------------------------------------------


================================================================================
 python-mutagen-1.27-1.fc19 (FEDORA-2014-17273)
 Mutagen is a Python module to handle audio meta-data
--------------------------------------------------------------------------------
Update Information:

New upstream release
--------------------------------------------------------------------------------
ChangeLog:

* Mon Dec 15 2014 Michele Baldessari <michele@xxxxxxxxxx> - 1.27-1
- New upstream release
- Only use macro style for buildroot
* Sun Nov 23 2014 Michele Baldessari <michele@xxxxxxxxxx> - 1.26-1
- Fixed homepage and source URL
- Set python2-devel as BR
- Fix documentation building and shipping
- Fix spelling errors in description
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.20-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Sun Aug  4 2013 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 1.20-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
--------------------------------------------------------------------------------


================================================================================
 zint-2.4.3-9.fc19 (FEDORA-2014-17297)
 Barcode generator library
--------------------------------------------------------------------------------
Update Information:

This update fixes https://bugzilla.redhat.com/show_bug.cgi?id=1174324
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec 18 2014 Martin Gieseking <martin.gieseking@xxxxxx> 2.4.3-9
- Fixed https://bugzilla.redhat.com/show_bug.cgi?id=1174324
* Mon Aug 18 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 2.4.3-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild
* Sat Jun  7 2014 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 2.4.3-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Sun Aug  4 2013 Fedora Release Engineering <rel-eng@xxxxxxxxxxxxxxxxxxxxxxx> - 2.4.3-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1174324 - [abrt] zint-qt: __stack_chk_fail_local(): zint-qt killed by SIGABRT
        https://bugzilla.redhat.com/show_bug.cgi?id=1174324
--------------------------------------------------------------------------------

-- 
test mailing list
test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test





[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux