User: Password:
|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0149 (gdk-pixbuf2.0)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0149: gdk-pixbuf2.0-2.22.1-3.2.mga1 (1/core)
Date:  Tue, 10 Jul 2012 00:24:41 +0200
Message-ID:  <20120709222441.GA25170@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2012-0149 Date: July 10th, 2012 Affected releases: 1 Description: Updated gdk-pixbuf2.0 packages fix security vulnerability: An integer overflow flaw was found in the way X BitMap (XBM) image file format loader of gdk-pixbuf, an image loading library used with GNOME, used to read bitmap file data for certain images. A remote attacker could provide a specially-crafted XBM image file, which once loaded in an application linked against gdk-pixbuf, would lead to that application termination (GLib error and application abort) (CVE-2012-2370). Updated Packages: gdk-pixbuf2.0-2.22.1-3.2.mga1 lib(64)gdk_pixbuf2.0_0-2.22.1-3.2.mga1 lib(64)gdk_pixbuf2.0-devel-2.22.1-3.2.mga1 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370 https://bugzilla.redhat.com/show_bug.cgi?id=822468 https://bugs.mageia.org/show_bug.cgi?id=6567 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds