Hi Santiago,
On Wed, Feb 17, 2016 at 07:16:20PM +0100, Santiago Ruano Rincón wrote:
> Hi Guido,
>
> El 17/02/16 a las 17:13, Guido Günther escribió:
> > Hi Santiago,
> > On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote:
> > > Package: gtk+2.0
> > > Version:
Hi Guido,
El 17/02/16 a las 17:13, Guido Günther escribió:
> Hi Santiago,
> On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote:
> > Package: gtk+2.0
> > Version: 2.20.1-2+deb6u1
> > CVE ID : CVE-2013-7447
> > Debian Bug : 799275
>
> This doesn't
Hi Santiago,
On Wed, Feb 17, 2016 at 11:21:04AM +0100, santiag...@riseup.net wrote:
> Package: gtk+2.0
> Version: 2.20.1-2+deb6u1
> CVE ID : CVE-2013-7447
> Debian Bug : 799275
This doesn't seem to be reflected in data/CVE/list. Did you forget to
commit your changes?
Package: gtk+2.0
Version: 2.20.1-2+deb6u1
CVE ID : CVE-2013-7447
Debian Bug : 799275
Gtk+2.0, a graphical user interface library, was susceptible to an integer
overflow in its gdk_cairo_set_source_pixbuf function when allocating a
large block of memory.
For Debian 6