On 07/07/2012 at 7:35 AM, Yves-Alexis Perez <[email protected]> wrote: > >On ven., 2012-07-06 at 07:22 -0500, [email protected] wrote: >> Re: http://security-tracker.debian.org/tracker/CVE-2012-2763 >> >> Working with upstream, I cherry-picked the code in gimp 2.8 which >> fixes this buffer overflow vulnerability in the script-fu server. >> >> The attached patch fixes the issue in gimp 2.6.x. >> >Hi, thank you for your work. Can you prepare a package for Squeeze >and >provide the debdiff? > >Regards, >-- >Yves-Alexis
Hi. You're very welcome. Actually, I don't use Debian-Squeeze but noticed on the reference url that it was vulnerable to this CVE. Feel free to use my fix. Regards. -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]
