Re: [SECURITY] [DLA 419-1] gtk+2.0 security update

2016-02-17 Thread Guido Günther
Hi Santiago, On Wed, Feb 17, 2016 at 07:16:20PM +0100, Santiago Ruano Rincón wrote: > Hi Guido, > > El 17/02/16 a las 17:13, Guido Günther escribió: > > Hi Santiago, > > On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote: > > > Package: gtk+2.0 > > > Version:

Re: [SECURITY] [DLA 419-1] gtk+2.0 security update

2016-02-17 Thread Santiago Ruano Rincón
Hi Guido, El 17/02/16 a las 17:13, Guido Günther escribió: > Hi Santiago, > On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote: > > Package: gtk+2.0 > > Version: 2.20.1-2+deb6u1 > > CVE ID : CVE-2013-7447 > > Debian Bug : 799275 > > This doesn't

Re: [SECURITY] [DLA 419-1] gtk+2.0 security update

2016-02-17 Thread Guido Günther
Hi Santiago, On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote: > Package: gtk+2.0 > Version: 2.20.1-2+deb6u1 > CVE ID : CVE-2013-7447 > Debian Bug : 799275 This doesn't seem to be reflected in data/CVE/list. Did you forget to commit your changes?

[SECURITY] [DLA 419-1] gtk+2.0 security update

2016-02-17 Thread santiagorr
Package: gtk+2.0 Version: 2.20.1-2+deb6u1 CVE ID : CVE-2013-7447 Debian Bug : 799275 Gtk+2.0, a graphical user interface library, was susceptible to an integer overflow in its gdk_cairo_set_source_pixbuf function when allocating a large block of memory. For Debian 6