On ven., 2012-07-06 at 07:22 -0500, [email protected] wrote: > Re: http://security-tracker.debian.org/tracker/CVE-2012-2763 > > Working with upstream, I cherry-picked the code in gimp 2.8 which > fixes this buffer overflow vulnerability in the script-fu server. > > The attached patch fixes the issue in gimp 2.6.x. > Hi, thank you for your work. Can you prepare a package for Squeeze and provide the debdiff?
Regards, -- Yves-Alexis
signature.asc
Description: This is a digitally signed message part
