Zahlenüberlauf in gtk+2
ID: | SSA:2016-254-02 |
Distribution: | Slackware |
Plattformen: | Slackware -current, Slackware x86_64 -current, Slackware 14.1, Slackware x86_64 14.1, Slackware 14.2, Slackware x86_64 14.2 |
Datum: | Sa, 10. September 2016, 23:12 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447 |
Applikationen: | GTK |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] gtk+2 (SSA:2016-254-02) New gtk+2 packages are available for Slackware 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/gtk+2-2.24.31-i586-1_slack14.2.txz: Upgraded. This update fixes a security issue: Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/gtk+2-2.24.20-i486-2_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/gtk+2-2.24.20-x86_64-2_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/gtk+2-2.24.31-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/gtk+2-2.24.31-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/gtk+2-2.24.31-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/gtk+2-2.24.31-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.1 package: af7bdd1ab5b724e44e1b79cc90f5e341 gtk+2-2.24.20-i486-2_slack14.1.txz Slackware x86_64 14.1 package: 42bd98bb9e354403cac04a6be9c61775 gtk+2-2.24.20-x86_64-2_slack14.1.txz Slackware 14.2 package: 752cfc2d26bcbff6fcded7fa8ea737e7 gtk+2-2.24.31-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 73ee0d92b662133f0c4daea0ff353dde gtk+2-2.24.31-x86_64-1_slack14.2.txz Slackware -current package: 7749e50ced2082872223d932701e6033 l/gtk+2-2.24.31-i586-1.txz Slackware x86_64 -current package: 9b563e9692cb84f05ee01cb87af75cbe l/gtk+2-2.24.31-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg gtk+2-2.24.31-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAlfUTjAACgkQakRjwEAQIjPeCACeNgLISzjIysBLaFnCqSLc5ktO voMAn0OMpGCJGamo201hIzzX/ai04Lmm =DKru -----END PGP SIGNATURE----- |