Since this is a security update, I'll sponsor these as security updates, and not as SRUs.
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-7447 ** Also affects: gtk+2.0 (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: gtk+2.0 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: gtk+2.0 (Ubuntu Wily) Importance: Undecided Status: New ** Also affects: gtk+2.0 (Ubuntu Xenial) Importance: High Status: Fix Released ** Changed in: gtk+2.0 (Ubuntu Precise) Status: New => Confirmed ** Changed in: gtk+2.0 (Ubuntu Trusty) Status: New => Confirmed ** Changed in: gtk+2.0 (Ubuntu Wily) Status: New => Confirmed ** Changed in: gtk+2.0 (Ubuntu Precise) Importance: Undecided => Medium ** Changed in: gtk+2.0 (Ubuntu Trusty) Importance: Undecided => Medium ** Changed in: gtk+2.0 (Ubuntu Wily) Importance: Undecided => Medium ** Changed in: gtk+2.0 (Ubuntu Precise) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: gtk+2.0 (Ubuntu Trusty) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: gtk+2.0 (Ubuntu Wily) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) -- You received this bug notification because you are a member of Ubuntu Desktop Bugs, which is subscribed to gtk+2.0 in Ubuntu. https://bugs.launchpad.net/bugs/1540811 Title: [GDK] patch - avoid integer overflow when allocating a large block of memory To manage notifications about this bug go to: https://bugs.launchpad.net/gtk/+bug/1540811/+subscriptions -- desktop-bugs mailing list desktop-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/desktop-bugs