From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Sat, 19 Nov 2005 16:24:00 +0200 From: Michael Shigorin To: backports@lists.altlinux.org Message-ID: <20051119142400.GJ16364@osdn.org.ua> Mail-Followup-To: backports@lists.altlinux.org, community@lists.altlinux.org References: <437C6213.8080704@gorodmasterov.com> <20051119135514.GF16364@osdn.org.ua> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="8bLSEqNM5P+Jqlqx" Content-Disposition: inline In-Reply-To: <20051119135514.GF16364@osdn.org.ua> User-Agent: Mutt/1.4.2.1i Cc: community@lists.altlinux.org Subject: [Comm] Re: [devel] =?koi8-r?b?5NnSwSDXIGdkay1waXhidWYgySDQ0s/eycg=?= X-BeenThere: community@lists.altlinux.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: shigorin@gmail.com, ALT Linux Community List-Id: ALT Linux Community List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 19 Nov 2005 14:24:22 -0000 Archived-At: List-Archive: List-Post: --8bLSEqNM5P+Jqlqx Content-Type: text/plain; charset=koi8-r Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Nov 19, 2005 at 03:55:14PM +0200, Michael Shigorin wrote: > =F1 =D3=C5=CA=DE=C1=D3 =CE=C5 =D3=CD=CF=C7=D5 =D0=D2=CF=D7=C5=D2=C9=D4=D8= gtk2 =CE=C1 ALM2.4 (=D3=D4=C1=CE=C3=C9=C9 =D0=CF=C4 =CE=C9=CD > =C5=D3=D4=D8 =D7 =CF=C6=C9=D3=C5) -- =DA=C1=CC=C9=D7=C1=D4=D8 =D7 backpor= ts =C9=CC=C9 =D3 =D5=DE=A3=D4=CF=CD =C2=CC=C9=DA=CF=D3=D4=C9 > =D7=C5=D2=D3=C9=CA =C9 =D7=D2=CF=C4=C5 =CB=C1=CB =D0=D2=CF=D7=C5=D2=C5=CE= =CE=D9=CD=C9 =D0=C1=D4=DE=C1=CD=C9 =D7 updates incoming? =F5=C5=C8=C1=CC=CF =D7 backports: * Sat Nov 19 2005 Michael Shigorin 2.4.14-alt1.M24.1 - security fixes for CVE-2005-2975 and CVE-2005-3186: + prevent an infinite loop in the xpm loader (RH #171904) + prevent an integer overflow in the xpm loader (RH #171073) - patches from RH packages * Sat Nov 19 2005 Michael Shigorin 0.22.0-alt8.M24.2 - security fixes for CVE-2005-3186, CVE-2005-2976, CVE-2005-2976: + prevent an integer overflow in the xpm loader (RH #171073) + prevent an infinite loop in the xpm loader (RH #171900) + prevent another integer overflow in the xpm loader (RH #171900) - patches from RH package - ported a bit of xpm-ncol-overflow.patch to rh-alt-bound.patch (which already had one of added checks and a few others); thus patch20 isn't needed =F0=D2=CF=D3=D8=C2=C1 =D0=D2=CF=D7=C5=D2=C9=D4=D8, =CB=C1=CE=C4=C9=C4=C1=D4= =D7 updates. --=20 ---- WBR, Michael Shigorin ------ Linux.Kiev http://www.linux.kiev.ua/ --8bLSEqNM5P+Jqlqx Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFDfzWAbsPDprYMm3IRAq2UAJ4/oibO0D4PYTMkD7iS8+wYPDk2LwCfS2J9 h2YXGZUUFO8fPtcud6n6Jvk= =sAvu -----END PGP SIGNATURE----- --8bLSEqNM5P+Jqlqx--