Описание
ELSA-2013-0135: gtk2 security and bug fix update (LOW)
[2.10.4-29]
- Improve patch to parse CUPS user lpoptions file to avoid crashes on s390 and ia64 Resolves: #603809
[2.10.4-28]
- Fix the filechooser not opening selected file when location entry is empty Resolves: #518483
[2.10.4-27]
- Fix integer overflow in GdkPixbuf's XBM image file format loader (CVE-2012-2370) Resolves: #846252
[2.10.4-26]
- Fix crash when drag and dropping notebook tabs Resolves: #830901
[2.10.4-25]
- Fix a problem with Wacom tablets pen event positions when using dual head displays Resolves: #743658
[2.10.4-24]
- Backport a patch to parse CUPS user lpoptions file. Resolves: #603809
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
gtk2
2.10.4-29.el5
gtk2-devel
2.10.4-29.el5
Oracle Linux x86_64
gtk2
2.10.4-29.el5
gtk2-devel
2.10.4-29.el5
Oracle Linux i386
gtk2
2.10.4-29.el5
gtk2-devel
2.10.4-29.el5
Связанные CVE
Связанные уязвимости
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
Multiple integer overflows in the read_bitmap_file_data function in io ...
Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.