Since this is a security update, I'll sponsor these as security updates,
and not as SRUs.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-7447

** Also affects: gtk+2.0 (Ubuntu Precise)
   Importance: Undecided
       Status: New

** Also affects: gtk+2.0 (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Also affects: gtk+2.0 (Ubuntu Wily)
   Importance: Undecided
       Status: New

** Also affects: gtk+2.0 (Ubuntu Xenial)
   Importance: High
       Status: Fix Released

** Changed in: gtk+2.0 (Ubuntu Precise)
       Status: New => Confirmed

** Changed in: gtk+2.0 (Ubuntu Trusty)
       Status: New => Confirmed

** Changed in: gtk+2.0 (Ubuntu Wily)
       Status: New => Confirmed

** Changed in: gtk+2.0 (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: gtk+2.0 (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: gtk+2.0 (Ubuntu Wily)
   Importance: Undecided => Medium

** Changed in: gtk+2.0 (Ubuntu Precise)
     Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: gtk+2.0 (Ubuntu Trusty)
     Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: gtk+2.0 (Ubuntu Wily)
     Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

-- 
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gtk+2.0 in Ubuntu.
https://bugs.launchpad.net/bugs/1540811

Title:
  [GDK] patch - avoid integer overflow when allocating a large block of
  memory

To manage notifications about this bug go to:
https://bugs.launchpad.net/gtk/+bug/1540811/+subscriptions

-- 
desktop-bugs mailing list
desktop-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/desktop-bugs

Reply via email to